19:29:41 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x2000}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 515.537752][T24738] loop3: detected capacity change from 264192 to 0 [ 515.560847][T24744] Can't find a SQUASHFS superblock on loop5 [ 515.570004][T24738] unable to read xattr id index table 19:29:42 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:42 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e5}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 515.668725][T24720] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 515.677808][T24720] BTRFS error (device loop1): failed to read the system array: -5 [ 515.752047][T24720] BTRFS error (device loop1): open_ctree failed [ 515.844043][T24774] loop3: detected capacity change from 264192 to 0 19:29:42 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 515.891608][T24774] unable to read xattr id index table 19:29:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {0x0, 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 515.987209][T24778] Can't find a SQUASHFS superblock on loop5 19:29:42 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e5}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 516.119008][T24790] loop1: detected capacity change from 259 to 0 19:29:42 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 516.265755][T24798] loop3: detected capacity change from 264192 to 0 19:29:42 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x2e03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 516.309409][T24790] BTRFS info (device loop1): has skinny extents [ 516.314807][T24798] unable to read xattr id index table [ 516.377371][T24806] Can't find a SQUASHFS superblock on loop5 [ 516.540219][T24790] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 516.550617][T24790] BTRFS error (device loop1): failed to read the system array: -5 [ 516.671380][T24790] BTRFS error (device loop1): open_ctree failed 19:29:43 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x88a42, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="850000020803fcff7500008394289789ab6d8000006bf143710b4e0f5371aa5e70b50e4838000000e4000000000000000000b740663d3b8895ca94ac64b9ac63ad9a2a17314648ab5ff104d7ee6bc2a924779664e88b278a23f4486c619b18bff8f07d7981a96a43f74ce89608c85e523a2e07ea1dda019f38db64360000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETOWNER(r5, 0x400454cc, 0xee00) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:43 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:43 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e5}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:43 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x0, 0x0, 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0, 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:43 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x3601}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 517.236000][T24866] loop1: detected capacity change from 259 to 0 19:29:43 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:43 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x0, 0x0, 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 517.277520][T24865] loop3: detected capacity change from 264192 to 0 [ 517.319680][T24865] unable to read xattr id index table [ 517.405128][T24866] BTRFS info (device loop1): has skinny extents 19:29:43 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:43 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x0, 0x0, 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 517.658721][T24866] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 517.674902][T24866] BTRFS error (device loop1): failed to read the system array: -5 [ 517.728380][T24909] loop3: detected capacity change from 264192 to 0 19:29:44 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:44 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 517.966137][T24918] loop5: detected capacity change from 264192 to 0 [ 517.984605][T24923] loop3: detected capacity change from 264192 to 0 [ 518.000706][T24918] Can't find a SQUASHFS superblock on loop5 [ 518.113883][T24866] BTRFS error (device loop1): open_ctree failed 19:29:44 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r3 = perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r3, 0x5000940f, &(0x7f00000008c0)={{}, "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"}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:44 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x4000}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:29:44 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:44 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, 0x0) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:44 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {0x0, 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 518.399839][T24947] loop5: detected capacity change from 264192 to 0 [ 518.438772][T24943] loop3: detected capacity change from 264192 to 0 19:29:44 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 518.460341][T24947] Can't find a SQUASHFS superblock on loop5 [ 518.474758][T24960] loop1: detected capacity change from 259 to 0 19:29:44 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 518.627042][T24960] BTRFS info (device loop1): has skinny extents 19:29:45 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:45 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x4100}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 518.767100][T24982] loop3: detected capacity change from 264192 to 0 [ 518.830598][T24986] loop5: detected capacity change from 264192 to 0 [ 518.878539][T24986] Can't find a SQUASHFS superblock on loop5 [ 518.901703][T24960] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 518.922023][T24960] BTRFS error (device loop1): failed to read the system array: -5 19:29:45 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:45 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 519.190105][T24960] BTRFS error (device loop1): open_ctree failed [ 519.204190][T25011] loop5: detected capacity change from 264192 to 0 [ 519.307103][T25011] Can't find a SQUASHFS superblock on loop5 19:29:45 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63b4ea94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000000c0)={0x5, 0x2, 0x4, 0x10, 0x80000000, {}, {0x3, 0x2, 0x5, 0x3, 0x5, 0x7, "bacce7ef"}, 0x400, 0x4, @fd, 0x1, 0x0, 0xffffffffffffffff}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000003c0)="c634cf1de04eba700d5b43c448887a26304916e69f4636fa9e84d58278643d96b49e8ebb9d032fa898e4dbfba2a634cb89ad1072070549c1848474255be6ee8ecf1ece0d73794cc0ea0bbd41639ddbf942a530e65daf7523ada715ef3638b4c58b4851f3b1fd9e6c3e1d563d1980a83563646b0c3d312f88eeb1fbffc4f820eb8fe8bd8864f0348e58fd9073c35d3cbf0096586013be037374d8433ae73e27673e0f9f72c32b84acbaabd6bfbafc20692309e1682b0b34c8d0647055e5a1efafb1f6d3d6b51ca380d7a82bd095c39f1b04996211bf63accc90a57170fc11fc", 0xdf, r3}, 0x68) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:45 executing program 3: syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:45 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:45 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0), 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:45 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x4101}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 519.492246][T25032] loop3: detected capacity change from 264192 to 0 [ 519.549382][T25035] loop5: detected capacity change from 264192 to 0 [ 519.574858][T25047] loop1: detected capacity change from 259 to 0 [ 519.590911][T25035] Can't find a SQUASHFS superblock on loop5 [ 519.632505][T25047] BTRFS info (device loop1): has skinny extents 19:29:46 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, 0x0, 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:46 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 519.861511][T25079] loop5: detected capacity change from 264192 to 0 [ 519.871493][T25079] Can't find a SQUASHFS superblock on loop5 [ 519.882304][T25084] loop3: detected capacity change from 264192 to 0 [ 519.895587][T25047] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 519.917309][T25047] BTRFS error (device loop1): failed to read the system array: -5 19:29:46 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, 0x0, 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:46 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 520.032623][T25047] BTRFS error (device loop1): open_ctree failed 19:29:46 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x5903}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 520.198662][T25096] loop5: detected capacity change from 264192 to 0 [ 520.246724][T25099] loop3: detected capacity change from 264192 to 0 [ 520.261371][T25096] Can't find a SQUASHFS superblock on loop5 19:29:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0), 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 520.403837][T25112] loop1: detected capacity change from 259 to 0 [ 520.490914][T25112] BTRFS info (device loop1): has skinny extents 19:29:46 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:46 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x200401f5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e25786d0fe8c263cfbd94289789ab6d8000000000000000000000e40000034a8a0f0000000000000000ad84b921bf9d92221c1167d290f1a6f8d5dd658db3d819faa550471cff7a91ab69e13ec177fd5f7128ed26d1d3df237ee453800f2cc175be62ccca6c1b66f62817d4c8102b46e7a3102b6486eb"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x2, 0x20, 0x4, 0x6, 0x0, 0x101, 0x4104, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x657, 0x2, @perf_config_ext={0x3, 0x8}, 0x210, 0x9, 0xcadf, 0x5, 0x5, 0x2, 0x1}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_int(r5, &(0x7f0000000200)=0x3, 0x12) 19:29:46 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, 0x0, 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:47 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:47 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x5d03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 520.703775][T25136] loop5: detected capacity change from 264192 to 0 [ 520.727352][T25112] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 520.762585][T25147] loop3: detected capacity change from 264192 to 0 [ 520.767781][T25112] BTRFS error (device loop1): failed to read the system array: -5 [ 520.788549][T25136] Can't find a SQUASHFS superblock on loop5 19:29:47 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 520.968709][T25112] BTRFS error (device loop1): open_ctree failed 19:29:47 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 521.182090][T25177] loop5: detected capacity change from 264192 to 0 19:29:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0), 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 521.223808][T25177] Can't find a SQUASHFS superblock on loop5 [ 521.294243][T25183] loop3: detected capacity change from 264192 to 0 19:29:47 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8", 0xf3}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:47 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 521.390060][T25190] loop1: detected capacity change from 259 to 0 [ 521.424460][T25190] BTRFS info (device loop1): has skinny extents [ 521.582257][T25190] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 521.600112][T25190] BTRFS error (device loop1): failed to read the system array: -5 [ 521.601765][T25206] loop5: detected capacity change from 264192 to 0 19:29:47 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x5e02}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 521.741539][T25190] BTRFS error (device loop1): open_ctree failed [ 521.782083][T25217] loop3: detected capacity change from 264192 to 0 [ 521.832361][T25206] unable to read xattr id index table 19:29:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)='\x00'/10, 0xa, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:48 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8", 0xf3}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:48 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000680)={'netdevsim0\x00', @random}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x10, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="8505d2dd000000000063cfbd9428979aab78210e90e733de000000000000e400"/42], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r5 = fsmount(0xffffffffffffffff, 0x0, 0x8) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c01, 0x44000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xc, r5, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f00000000c0)=@isdn={0x22, 0x61, 0x7f, 0x5, 0xb8}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000003c0)="d166b71209d82c80eb7c4b751229cf25b8a696804ce3a05df0a697f900d65eb540b3e6fc47331d3b2ce8933979ecdfe654efdb3ec14256b870baefb31220da34cc9f69f78b03ee2f58c10cdd4086918b7713b7999aa9d24048bcca0e911814242701335b71e3b3edf031525462096cb3aa7b85deaacad3187369361b62215be0b666659b790db215785cf4cdffe5ed1b6f2d1a1b5c44948fd9dd35c18ef2754bf9f29b242d3da68608397332cf", 0xad}, {&(0x7f00000002c0)="5b597f7cfacb9a834a6c8631c5ec933d436b22a1f4b544c297302305646da72a80f64c0a6a1570d98cac6b9ae5170e7bbb3ca6ea19087d6d25d8941004935a4c7a310eebc2df32612b56df238e3a8b", 0x4f}, {&(0x7f0000000480)="c40e8cb1b748628c0e3f3d3346f6bce56b363bba9bb84c410f9ad2dd505618d52926f9b44900d6da479cea2650e7ec8ea21f1a0672f5f33e4c7288495b7ea85da119ee26eae7a08e501cc5576e4e749556e1f022a905414a6f909762452f1d992fc9016c3ac4e64091a8741ecbed3e22a784a28ee22e7e9b9a349323816a121ca472e57b9eb23cf14d8a9b6c4d1c5674", 0x90}, {&(0x7f0000000540)="e628190ca173c89510103302123d457fe3300a2142742f4feed88f4cc02866af47b7e39d9686a58587832ffd95be4c4f097ddf0367dc7180607da62242909a0e039d06c3a7c764033fa660c7c91b84bb6f752c4355534fa9aaefb05340d8159cfb56acbfc9", 0x65}, {&(0x7f0000000240)="9e46b86850b28c8280650875619b58c1cb7fd8c76e1a9ec8fe3fbdde45afecb2108740960b18f5e8c2d61acaa03444aceb8fef1d46b8ff6c", 0x38}], 0x5, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x328}, 0x1) write$cgroup_int(r6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:48 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 522.267348][T25239] loop1: detected capacity change from 259 to 0 [ 522.293165][T25238] loop5: detected capacity change from 264192 to 0 19:29:48 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 522.334140][T25239] BTRFS info (device loop1): has skinny extents [ 522.364445][T25238] unable to read xattr id index table [ 522.406997][T25249] loop3: detected capacity change from 264192 to 0 19:29:48 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:48 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8", 0xf3}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:48 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 522.635754][T25239] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 522.657025][T25239] BTRFS error (device loop1): failed to read the system array: -5 19:29:49 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7507000000223ce35079453e63cfbd94289789ab6d8000000000000000000000e40000f569f74ec138c81800000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000004, 0x4000010, r5, 0x8000000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f00000000c0)={'wg0\x00'}) [ 522.734366][T25286] loop5: detected capacity change from 264192 to 0 [ 522.748793][T25286] unable to read xattr id index table [ 522.816878][T25296] loop3: detected capacity change from 264192 to 0 19:29:49 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c", 0x16d}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:49 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x6500}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 522.881332][T25239] BTRFS error (device loop1): open_ctree failed 19:29:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)='\x00'/10, 0xa, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:49 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:49 executing program 3: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 523.010308][T25305] loop5: detected capacity change from 264192 to 0 [ 523.030158][T25305] unable to read xattr id index table [ 523.042768][T25306] device syzkaller1 entered promiscuous mode 19:29:49 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c", 0x16d}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 523.154956][T25319] loop1: detected capacity change from 259 to 0 19:29:49 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 523.253027][T25319] BTRFS info (device loop1): has skinny extents [ 523.265992][T25306] device syzkaller1 entered promiscuous mode [ 523.333664][T25339] loop5: detected capacity change from 264192 to 0 [ 523.342235][T25338] Can't find a SQUASHFS superblock on loop3 [ 523.378799][T25339] unable to read xattr id index table 19:29:49 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$cgroup_ro(r5, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:49 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f00000002c0)={0x2, 0x4e21, @remote}, 0x10, 0x0}, 0x200001f5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="850000ffff1affffffffff8326223ce35079453e63cfbd94289789ab6d800000ac310000000000000000e400"/57], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400e, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x141802, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x12, 0x208f40) openat$cgroup_ro(r4, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:49 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c", 0x16d}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 523.591631][T25319] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 523.614992][T25319] BTRFS error (device loop1): failed to read the system array: -5 [ 523.677939][T25379] loop5: detected capacity change from 264192 to 0 [ 523.691015][T25379] unable to read xattr id index table [ 523.695953][T25376] device syzkaller1 entered promiscuous mode 19:29:50 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:50 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1aa}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 523.806124][T25319] BTRFS error (device loop1): open_ctree failed 19:29:50 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x6e02}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:29:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)='\x00'/10, 0xa, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 523.992771][T25394] loop5: detected capacity change from 264192 to 0 [ 524.014407][T25394] unable to read xattr id index table 19:29:50 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1aa}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 524.183608][T25407] loop1: detected capacity change from 259 to 0 [ 524.215917][T25407] BTRFS info (device loop1): has skinny extents [ 524.271335][T25414] loop5: detected capacity change from 264192 to 0 [ 524.301229][T25414] unable to read xattr id index table 19:29:50 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a0100000000", 0x1aa}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 524.473088][T25407] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 524.491102][T25407] BTRFS error (device loop1): failed to read the system array: -5 [ 524.516275][T25438] loop5: detected capacity change from 264192 to 0 [ 524.560526][T25407] BTRFS error (device loop1): open_ctree failed [ 524.588163][T25438] unable to read xattr id index table 19:29:51 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1c8}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 524.817211][T25376] device syzkaller1 entered promiscuous mode 19:29:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000", 0xf, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:51 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)='\x00'/10, 0xa, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 524.902630][T25461] loop5: detected capacity change from 264192 to 0 [ 524.941962][T25461] unable to read xattr id index table 19:29:51 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) socketpair(0x37, 0xa, 0x7ae2, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) read$FUSE(r4, &(0x7f0000000480)={0x2020}, 0x2020) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f00000024c0)={0x1f0, 0x0, 0x208, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_FEATURES_WANTED={0x18c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_BITS={0x98, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, 'syzkaller\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x48a}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, 'memory.events\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4091}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, '/dev/net/tun\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '+\xc7W\xb7\xc7\xde\x9c'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xdc, 0x4, "efbc9befc65c1483a4e018232e4678f59575456e3e19d72faa0dc1ce373780b701ce2f87baa1101ef5d00f5b9edc753df174fe2c71543c689f04ee9357dfdd35f7882f3a36c28ffca2f6ed8c26927edb7b2b609f2fa50d398f26afc7419ac9abf6c0818594b4f5755d29d1ad812ff463e7358b61430dfa29ade493d8afc4dfb336c3945cc115a03e60a46f2d758bffc8f7dbfe1a4562f288e5e14aaa6fbc3d8ace0776fa6f3dc365a5ac01c3f1f48510c1163b7b9f096cb264fb176d0eb3e280a2cc52b4917acb2c60dc9e5a6a48ac1677134f76a0a0d6d5"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}]}, @ETHTOOL_A_FEATURES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x800}, 0x2000401d) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffffc00, 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:51 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x7602}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 525.018433][T25467] loop1: detected capacity change from 259 to 0 [ 525.091383][T25467] BTRFS info (device loop1): has skinny extents 19:29:51 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1c8}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 525.180498][T25482] loop3: detected capacity change from 259 to 0 [ 525.237940][T25482] BTRFS warning: duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (25482) [ 525.250282][T25467] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 525.260089][T25467] BTRFS error (device loop1): failed to read the system array: -5 [ 525.277492][T25506] loop5: detected capacity change from 264192 to 0 [ 525.304960][T25506] unable to read xattr id index table [ 525.441279][T25467] BTRFS error (device loop1): open_ctree failed 19:29:51 executing program 3: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x6e02}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:29:51 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1c8}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000", 0xf, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 525.657409][T25522] loop1: detected capacity change from 259 to 0 [ 525.687896][T25522] BTRFS info (device loop1): has skinny extents [ 525.768975][T25527] loop5: detected capacity change from 264192 to 0 [ 525.788334][T25527] unable to read xattr id index table [ 525.807177][T25522] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 19:29:52 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1d7}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 525.837311][T25522] BTRFS error (device loop1): failed to read the system array: -5 [ 525.928591][T25548] loop5: detected capacity change from 264192 to 0 [ 525.951568][T25522] BTRFS error (device loop1): open_ctree failed [ 525.983532][T25548] unable to read xattr id index table 19:29:52 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1d7}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000", 0xf, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:52 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x7800}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:29:52 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 526.294709][T25560] loop5: detected capacity change from 264192 to 0 [ 526.306036][T25560] unable to read xattr id index table 19:29:52 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008394289789ab6d8000000000000000000000e400"/44], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='THAWED\x00', 0x7) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r5, 0x125d, 0x0) fallocate(r5, 0x49, 0x6, 0x860) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) r6 = dup2(r2, r3) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x7f, 0xb8, 0x7f, 0x5, 0x0, 0x6, 0x30800, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x1, 0xafd9}, 0x1e8, 0x443, 0x4, 0x1, 0x3, 0x8, 0x7fff}, 0xffffffffffffffff, 0x1, r6, 0xb) [ 526.373063][T25571] loop1: detected capacity change from 259 to 0 19:29:52 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200", 0x1d7}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:52 executing program 3: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1c8}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 526.454421][T25571] BTRFS info (device loop1): has skinny extents 19:29:52 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 526.543922][T25584] loop5: detected capacity change from 264192 to 0 [ 526.622856][T25584] unable to read xattr id index table [ 526.631731][T25571] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 526.644489][T25595] loop3: detected capacity change from 264192 to 0 [ 526.676036][T25595] unable to read xattr id index table 19:29:53 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1df}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 526.736187][T25571] BTRFS error (device loop1): failed to read the system array: -5 [ 526.889271][T25626] loop5: detected capacity change from 264192 to 0 [ 526.903990][T25571] BTRFS error (device loop1): open_ctree failed [ 526.912146][T25626] unable to read xattr id index table 19:29:53 executing program 3: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x3ee}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:29:53 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1df}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000000000", 0x12, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 527.220298][T25639] loop1: detected capacity change from 259 to 0 [ 527.276036][T25639] BTRFS info (device loop1): has skinny extents [ 527.292870][T25642] loop5: detected capacity change from 264192 to 0 [ 527.343148][T25642] unable to read xattr id index table 19:29:53 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1df}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 527.494247][T25639] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 527.513825][T25639] BTRFS error (device loop1): failed to read the system array: -5 [ 527.568691][T25667] loop5: detected capacity change from 264192 to 0 [ 527.592367][T25639] BTRFS error (device loop1): open_ctree failed [ 527.616207][T25667] unable to read xattr id index table 19:29:54 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x7a02}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:29:54 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000", 0x1e3}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000000000", 0x12, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:54 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001940)=[{{&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000008c0)=""/4096, 0x1000}], 0x1}, 0x9}, {{&(0x7f00000002c0)=@nfc, 0x80, &(0x7f0000000780)=[{&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)=""/212, 0xd4}, {&(0x7f0000000540)=""/173, 0xad}, {&(0x7f0000000600)=""/190, 0xbe}, {&(0x7f00000006c0)=""/61, 0x3d}, {&(0x7f0000000700)=""/71, 0x47}], 0x6, &(0x7f00000018c0)=""/106, 0x6a}, 0x6}], 0x2, 0x10020, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000800)) sendmsg$kcm(r1, &(0x7f0000002c80)={&(0x7f00000019c0)=@l2={0x1f, 0x99, @none, 0xff}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001a40)="6d90a5fd39030f5c192259a44d180d5281f2e214d79b8b8bb8e1f7953db95df9c12eff87fcb750b469a0fd79cbe3f71328b25c8a258b54c01a7b", 0x3a}, {&(0x7f0000001a80)="d2c24e3a85a30003ed285d619d072d6c1c37dc9e4d9757e50374e1ce80e29a2e4cae9e1e0daca22175f0030680304e115cf0e89f9ffa00d492c869b0bc0adcabb93a3db7", 0x44}, {&(0x7f0000001b00)="796da04adc86080efd", 0x9}, {&(0x7f0000001b40)="959d212d5366a4fbaeb2c75db3336c1be2a813a0b7e2a37026617fef98b1a047c56400694f4e260e5299a6ac66b78cce5bb9c204a8786ff972e94ca005d3e1cbf906ca7d9e49f445064b95e1b305a21903e006a02bdf8b5a08e8376e4f765f2f7c8b485cf3ce157eada46bd1afbbf26f2ec0fcd367fefd5c", 0x78}], 0x4, &(0x7f0000001c00)=[{0x40, 0x111, 0x9, "7dc8defe23d8615ff625d030a03754681bd6a9d258485aba55da92b95196f8a8ef46068c957c3ff8a7fea8cb3a12fafc"}, {0x1010, 0x110, 0x1ff, "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"}], 0x1050}, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000380)='FROZEN\x00', 0xffffffffffffffa8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:54 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:54 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 527.910662][T25685] loop1: detected capacity change from 259 to 0 [ 527.982704][T25685] BTRFS info (device loop1): has skinny extents [ 527.987368][T25689] loop5: detected capacity change from 264192 to 0 [ 528.061786][T25689] unable to read xattr id index table 19:29:54 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e3}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 528.154436][T25685] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 528.165444][T25685] BTRFS error (device loop1): failed to read the system array: -5 [ 528.287230][T25728] loop5: detected capacity change from 264192 to 0 [ 528.333869][T25685] BTRFS error (device loop1): open_ctree failed [ 528.384219][T25728] unable to read xattr id index table 19:29:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000000000", 0x12, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:54 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e3}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:54 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x7b00}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 528.580526][T25745] loop1: detected capacity change from 259 to 0 [ 528.632497][T25748] loop5: detected capacity change from 264192 to 0 [ 528.692655][T25745] BTRFS info (device loop1): has skinny extents [ 528.703798][T25748] unable to read xattr id index table [ 528.733279][T25745] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 528.743030][T25745] BTRFS error (device loop1): failed to read the system array: -5 19:29:55 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e5}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 528.855530][T25745] BTRFS error (device loop1): open_ctree failed [ 528.915062][T25775] loop5: detected capacity change from 264192 to 0 [ 529.018525][T25775] unable to read xattr id index table [ 529.058345][T22701] Bluetooth: hci1: command 0x0406 tx timeout 19:29:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000", 0x13, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:55 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e5}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 529.220729][T25787] loop1: detected capacity change from 259 to 0 19:29:55 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x8803}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 529.296385][T25790] loop5: detected capacity change from 264192 to 0 [ 529.323916][T25787] BTRFS info (device loop1): has skinny extents [ 529.347760][T25790] unable to read xattr id index table 19:29:55 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e5}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 529.539405][T25815] loop5: detected capacity change from 264192 to 0 [ 529.563950][T25815] unable to read xattr id index table [ 529.574676][T25787] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 529.615044][T25787] BTRFS error (device loop1): failed to read the system array: -5 [ 529.736291][T25787] BTRFS error (device loop1): open_ctree failed 19:29:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000", 0x13, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:56 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, 0x0) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:56 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e40000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:56 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x9a03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:29:56 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:56 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000002e80)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55, @ANYBLOB="2db85fe6ebb882e73590c8c14d8bcd1037ca38620ba6d43ec4d6bb4a53b2053fd86dc6b74b5964f0f8b21cab2a1819dbc29d911b9f05245b8b243987f62548a3dc6bed627da346e50809a3aea4b799c27614f86b2dabe875bd7705a19558059a4c006c7a599427da0afc150f23fb38e2bc7715b9061c3ab3ffac527272ed302cb827a2c0075924b9440805ad1b5aadf3b8e9b3eecbc6ca9c4e9c08d83657186141da82236ae9b99c217e890c46ab4927f546ca44fd2b4b464f095cafeed949abb79620815c9b0e43f395620feb5d8bc65a06722b052d729ab1974ede463059f9824850179e32e2e160237cd8f316335940a2acddd9c9c9238fbfdfdbde0a95b9297d1ff2589b5b7f1be27056b9be15e806000000642d7f6bb6fae34dbb074a7ff8ee9ab04c4cbc04f362276d2a43ca1aba02b6d721a9e3e093fbc12256100acdb94ddd36cdeaea5fe98d2a9b1e33ea7ff12cc0da7e67f840beb53f7fc26210872929b7af66709333ea9bdfd776b8b0b25b9030f5d2cf3fc2508dad8c0dd23465a4f7a0d7d4b92fbc7b8636518dfdeab391abaffd366fb0ee6ec8c5413d81ed01c50aa03b06b5ed6caad9f268c75143eb2bac7b3423d6d2618b7063bcb0e1c8b3578bba77e9952e3f7c80663624afcf6a10a7f872e4da12e43f9c2d3df760770a6276c0a67b6bd34f402f4d3e5abf5e45e3faffea44579427d8169776a1b9a867e94b6194ad1d0b9b250495dd76d5104bda55591dcf0f227aad34"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @multicast2}, 0x3}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000008c0)="21d596c291b816c3bd4ad6a0afde5e8a46874bf98e2958e79ba45d1ebcadbded7dbabda658bc62c7e72224937852f6480f63c9d35c541a052f268370955ef01ccfebbb5302b04b25d46b68411ff9d9f289459924f2cb62e179bedab7ee014aca1dda166127014e53f9ad2df831b0e1b720763b48ae8de61aa1d92f1a19d350be6db9d9ccd5da2e9addd60c54c392fb1001fab575f6c2e4815064585399908e1b57dd92767f39ca2f65f21d047ce2e38b7b1cc1ef12ff393505986c3df23fbd5c5d26fdf2f229d2b74949b0f0827f0cb2a89646201fdee490551f0ea32a063caabf491af5fee5ed36ee4429ea90311e9e9af26e7694e2e11aa8051ea9f8a48fd80ddd98ba537911e58648af911f25f35b54589fcf259c5eea01822092eb029163c91ef412b0d983bcd7945779c9e6c5d7c840584ec1f8c2862372475d1a6f773eebebceb736d9f861ea3730261e3a158adf4500b3be305cb6a6ccae66eca4e3df8cd546059f4b6089bc84bbefc611fd83acda512b1b2e1e8806f95a7f6ba49e12e4d9fc41db0ae60ad3e5e134c7352d33034e61eb2caec046d40002ba487b7caffeccc07f11455fed5a87bc70b5da6b103ec2c74b12a0b7543bab9e272c7228aed079ce6366b5f13d922371b5e8a9d6dddebac20c36e5be34c735a63cb6dc867eddaec4b9bbd176336e9b4f679dad4e8dc25d7cfdd6d9ce16c7ded3bf4bb3adf6bd8d09a1cfd4848ef782cee8cc87646fb3ece82e8bebd2f34fb0c0ba440ec47b0ad7485abf9c9670c65ab403b6355af4e2de6e0d4ef6d581592c5387675b95c7992c050042bf79c383ae1c3bf7c5c4f6f0ba86c6e2e6cf78502e2fab8eab7e375f7608926bd4f31a007d6d5d444a2f2a66d8ced42ff733fc2d19a2779c84ff7a3e6a80aae77df606ab2a8cd3d261ecad75aead5895f50f153157557692b852fc1ebea1649c78d494b23d4222b3216e05f498f1b34b7326d9ab343eaa7200a589eb5424ef4d61f4b10169a4d0d70d2a49250bc17cf04cd09216c23d8a8838684497b78798e765809c0bd38969cfb2ed87799323ba7ba052c698c6efe9f72bc8a66a55d3fb36a0093409e4e24fa22f3f29137f7c1ba00909892664bfc12789e4c296b1dfda575da21c3c00a0433950c06d1250f86839a42ceb8fd4fedf09f3df1a3dfdd36df23c2cc3c58216e3b886f92fb907a299e224d922c8a15814df879ed2d38874da3ff3cc55c100bf4ed18106d390fe462e2fcabef59c210f5860d6aef9495beb7eaeb3b30b9085936c5e625bc7ba96b842a2aa041978f288a74249a0d7994365e3328e57f94d617d74b1a84231421f725f94f82e7a6160a42ec69700fada3a9d90ffacfce35d672304bc6f8352633d803f1d6ceafaaa5ce80f74761f0e23214d9c87d657a477f8f605bfb66b6b92f8a3b347a7ab559d0e8ed2e54b61eb543a1234ffdb8dad4e5437a5c4633c066831a0e69ceef445e0a70b0ec2cbdd0fa2e1e2e3d192479cad9719a76bfd67c27c58bd16c016926a51e33d5620c0cf9e1bd609b339b0d89a87df3b9b8c5880a277b9faa947c153f3a199426197657db7bcc2a8726d67b2d1a4968a249c44f651bebbb600c512e71c0581ba045d96fc10aad85906cac53a85505024c68dbbca90d7b868397484350c37e40cfbc7f329f4f4c097fa011c6d87c8942e7f6d073f9092200947ca0106a7277d0d0c202fe0a1a84bb2de3388132ff7cebee879f5c266d3a80fcd8732a82afd00dfc088bbeac1bce4e768bd14729524372fba70612494bcd07ae39296ec88fbcd6e89bd11b38a2a335c3f2c1b3b5e93df3041f35350558345ed5ea826b439e18cfea9a569ec285b8c21ee4890a0f6ae8478e31cec14021b635ed330a1245d5eeb22a2e0d341fe7a03f1a57b40b39e3edb4d0c090d4749313e9185538c77706177c833c754feebf74bb5314a50f55cd884e9e490d68e903739de497b77f1d9356458b1ae80068d039e960e5d682e241da6c4f4551e030e61a24093aaf6b1ca594e302eb96dd5088eab255b76a148fb8f4dc8c581c123e3fb9659791fdb3e352920a90e060bda131806fa493b9757c7a8e7cbde8d270370a0ee79e1a9f27eaf5007271ebe27ef0cc2be27bd803b3d39af906c3d22e482a55875278a12c22dea88acdf72041039bed822b4ac71e9903aea79411f320043f5aa9c92f1385a959dbe370ef6d9f34e2a9021d6ed0aa40911a00590bb1929bb5065dbcc3e5a328a4a539693ec5a3cfa372368ffe5aa88459c5655f1e2584b3fd3f71db7384c279550acccad33586af89c8444739060e039c5c4991c8c96045b671d983251203f95d604e493abb06de531721a1cafdbc3139e714f0cc3af154383e6c0b45624f0d280075afde4b425bd1ee56a567943839138a995eabc873a0f4dc189556c1cc995e994d2af5f2bfe78dfa6a408c7e1d1ace2ccb3454552fd5d99cecf06bf5c22b35d4862ec29758a38ad49faf543a6e377cfff74cdb4da89b8c6c42af89c41b548751ebc8b34314cd97665ef7028a67f49f67fb62c4d7a44a1cbdee2697fae7791b8b7f785624f12a1ec415c7bc67a4b898d6b7c1f87ec9b5a22d39fee5e1fb3cf06127fc5197603eb78344d438952ccc7af828251034e7fd1b6089e4b927c9710406ac5deaff40bd66907545de35388852830dc0ea086a8c07be172a21bb7141a1b51c343c2f6822cb6f43e877ae2c036435a7cc8b097c46f0194d0ed4d500021728a93f2ec97f114bd87d7653097d78e115b556706f1fb6eee5d76efa905baf3f3b071c8b1108625079977ba9fbd12266d6e7db73f36ba8fb01884ed843ed2aae2472465f3c6588b603765de64278b47d1030d56414778999950898d9f3a58aed11d2fa38622af914672e9856f3d8ab0d7c3e7810df5542fd40dbf698f04e4b5731728c433585457bad2d82ca516063f39a083d61389528342dbba3d24b8f9fbd994939bdeaedba71de0fa5d6f995dec7f977fbde8fef9a943ed5bd8554b80b7505c62f55614873da9d8bc4bbd7b0cd1fbb9ace411af380180069945963ee825435f3ed3e794d5d3509db85facc0c126ba21e27e5cecb2d39291c07de1ac6c0b89daed6922ec91fc936a93b698d5959d77c77b764b38d6c50bdb3e0fb2572c283add0988bf70e997f233d007508a3f7fb88cccfe5eb56ced43a0cbc8dade53e82a52022867ad1ceb01ca3533c94752711c3153e814090adb7121ebbb0254fa0b4e2c00f10b6704977e03a703d122cb90576608ec2ac131fd53d0c756a238d27445aa7247ac0b6e34d57916864a60b1c781265c6e1631b6ed2689d89788c8ca63889c8cac4b9dc100cc3cd0fee40830c8fa4e6147756867a26b47d9979f25e1d30b3c23b3ee34d7700e335d847fd59577360688af6f9ab5531b8c423bf9340dc589f23f0e3423512443dd815fc0e2c87691c07fc5bf82eff7a7f08b167f5f8fc8383ae6fcf560d72a07dfd54ad0ae741c8d0c2cf1b7a1be480432b625322fe6d6073ca62a6a570f3fcc603922623adc555816ecaa0e6831657964d5ecbf64a45ad17cd08ff4e1e222e2812745ab9b159642a71ab3c02b1d1d7fd1b88384c969c5fbb0233f7f061dc76248871b52dae30b67a39307e206d5f3f5f5f350098b16bf40c92eb9fdb1e63996ca8a6714b45e40e2c261b17d679a1e4d59679bc51c0b930ea68b50356fbc16248b683dbf130f9b6795f3cef4c4365a5156c970383cb601e62af2e86924f9ae1555cd48d429d6b996f2bd30a84363ac7dcd9cec88648a088e5fcabc08c4f17025f3b8e852007447650dc9529787a69300fd1ba618b9dda20a245b5e749b2a0dd8a14efbb0dc4c0f5fb7f7cefaee091b1863b82b965065c479f00182063fdf6821c07d73a13f01e190b421b7d9a358904566a6d0604b5f20b596ead33fe43c810232c381ac808a5f7bb3fa2d7ba7b474b4a2fe08f218a69e7130113d9f5228b187138751581967e08c76266f7855cb29a3a15739737f021ee9712b5378cc9ec826c6fc43db480bce4c0dc78c6f699f29d961936546679d8993e5ebc85f9a529be9838d30e3178e28c5628ea0593f4a2d3810476a92b91f5ec76887fe35f85cb55ef8599a9304cd0d67ee171da99b224c7edcac7081a79d1b63083a6a3c167739259453e74d3a2b0b2febcde1edbeb118fafe8b41b01c64fce3f2b915ef598873cfd0fcffae4982d8f06b6cd0c6db3e9554b238ed2191af574b826ae602d15e184f76e737002cc89cca029f711cbc93faf464fc77a7af048bd4cfc355db2ac89b6dc7c666b228c1f0e1355baa562fdbe3728e4842e13c49c29a62afef8d53d2bb5489edceb7663434aa9d22c8df5e9b2ce33d39ba803ff06f1c33a091c687959889ddc3ba7350d55a35d51b3abca932182dfbb2bca880a2dc4b1c9dbc6e528c81ab01a73e005bfedf31ae98abf47cb7d16da20611f94cdc89d8e9a20da67607ad75bf2c9a4575c486015b7069050beb52aa52496226a9c40ed796a814ce90d5b8170943c025e0e880dec4bab7d1d635c4938c2f180459ce3ab2bb3b0350a9d5d6a4623b4a54c0b8cc91d6c1aed926b4dac99841343c654a6803e354d5f5c08953eb22fa0d17f74b464a09b31329667ddce6eb63709b8a3556fb95bea7350e2cb8eead4c4e771bf66a989d215bdd81bdc899886ddf2090cacb153c93cf45803cb485c08af81f2d4ca87a9131aade976fea1f0cb4831f1c2aad24ac202808bec6bced60b1dbf9822180233dea7a341e17dafe2fad2305d3718af11fa85a1ff82a344af07d5f3c32e01e904549196422c64024aa099956a7f9701042eb38fd1c2d3fe4f5f35f2b612c69fffe581a6372a0ab4ecdf9a0194793adf72dafe836a3d41218a79625aa3178101c9e23187d6ebaaf1aaa6e8a28c26a7b66c98d195224721e4720bc12309281939c405b94439bd60de7ebcdcd04731e803418d5f7a636db12d22233d4390a73b2571a00fd71170d073097937cb4b513ae4e8474ef2aa19fa37039d2b1aac7966442c977ab66e72726b779eefd6bdb18da5d52b211b465f58d9995881c28a268bb37810d5aab84159166bdaeab8acf85972be577347b3db0be600644b5b0e8b8f5afc31d3de49cb9ba21e9d7588afe0df550e693c5a5fcba84a2c4965f4cc6c452bf4dc9fe8afadb9dc393335e9c86f57a804035d76d36de1aca1179c1008bdba40e320bcb969848107d1eaf739e1bd0489da0901ea1f80a298812876cf0eea2c98213686c9168bb010dcb633ea54d0ec32cb95b916a09ef65b0c2e86fe527a19b29fe75819609f5e0c04e32b65f0d1b5a7d3e4e020b4a494ccd14851243c9fa20dba482da03928886641c845a7efd194a49ff2ecf8d46d024107458b85c9d35f173083c45c65f66332fa052d60a7802481f7dccc7553bbecb88f2c443bd23a7aab11e008c37683fbe26dacac482730b6b9f8b57021a34d801b460cbc5a3d515cfa0dff8a19af91996aac377df3fe53eb48a6e6b534b1154a7686e374e748168a5927141704763c5540d10a4b7ef1692d98f531d0f7ec6ae605d4d8b538ce82f6f0cb1ea146fdd20fd277e9599dd2a38ff512e5a148a5c5536702ef9a9f5bf9cf386871ac53db9d3095935358c40617994e82b6d8764bc9d06f28b2aa070866b9e0976d3bfb3304a1310ba5b3f17df97b1dd1537729ec349dad6b3ad5d178b771a59d659b175abf59819c6b49f5ad777f24e8b8cb97dd7a4a12dfa412f8bf60e35e96c17ac3d48f5ebce7ffe817ac7189bbb00228e6a387dae53", 0x1000}], 0x1, &(0x7f0000003100)=[{0x40, 0x113, 0x4, "49a6b655c0c9b6dba3dcc38615a7c3127b12e059af04cff52662869f89c81a273c089947dd807ab684645414"}, {0xe8, 0x116, 0xffff, "49817d021ad23b08002000000000008d5bc5f84583f6d63cf05eea952ccc5a3d882558d2c95b9cadc8939457141e0cf9162311805b7183e566511f9b046b3345819620e8c36f6b3fb04317761f488783a703b5ecda194dbfc2f83d76ceef95825304b439e1b129f8824059609926eac7276600ecdf3f4d40f5924b1425897b5ccaf283a5e3e9e0ce0be7d4c7f885274c79e8d414bbe9f4fbaa80d47eaaa032a58efda0f112b6f71e2239d8b26c9139e77c9aba3aef44fd81b62dada5adb7ef82b8985f193efc86a3119184e78aded87e1d"}, {0xc8, 0x11, 0x9, "fb7f81466018394c99df2f65b42d02e8406f62b46f170feb4c4d7df2ff391db0a8f76c905a9482a86dcc2a23547f9ba91f69fe4ac96f0dfa3ec0fee69928c6d2370de4f9d1ba5e16fa1639b55aaf3f65c47155b29fc8fd6b950b75ead29ceb39e1203a4e25805f6bb546457b4b732bc04bab562ec2b75005eb7fe55797fc0410a9475e1c899522874d4b8672a78598e5de438cfec0a8be31a1b7ad257a77af56d60c9ec953bc1d16907293bb22598603f2"}, {0x1010, 0x0, 0x0, "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"}, {0x90, 0x10e, 0xb3a7, "0392a146c50cd8a7f06d9965f413de53646a5038adcb0bd13c9a24fb0bbb6715b3bee48e4e25bffc7bfdc225a9897d109ebaed381f00f22774e7ca378452bfd7593f3e856b0b535801b9b3d1c1066aa486888b793386115becba1d1e32205b51c8bd9b374bce41145cf95874deb6e8f3a989f00b7413ae0644ca73b7fba7"}, {0x18, 0x101, 0x3, "bb05f3"}, {0x80, 0x1, 0x5, "e043bbe522fbdb4a21fd7cb6e91486ea886692d4b51a8e80ccae141348ca87945fba0b0f450e99d2fb468d6358246d5cc27273988667fb0681604108cf9339cf8f7032c3eeaa14731145f6186b0fe3e44f24579bcdb0f3ae887f1c75652d7fc8daa174626428f1dfdbca0359ccbf3348"}, {0x88, 0xf0, 0xfffeffff, "6f863978cb15a7689653063667632f83d5b5e9b903aaa487b4206510123b6b5e7a9aa45aad290da256f07b23a69e09b6e27f91a4eaf823b9d6de195c4d4251fa714793a2f6b1c9ba04a6b060ad2e7dcefeab12a6b488c49f145c86087c948263188d3339c2ae3145b72e887dd082dd9f0d873b"}, {0x110, 0xe0d4acdb306aacd7, 0x5, "36e1e923559ca52e682e06099b365da5f346261afc44d6e762d86aaf1a8201a36e7dd69422a8c4e9b25e663a571f57489b188d028ba9b5873d32745fc6b4584693e28a47d42819f80546e9f7fd12e7b54a482e7ca276639d13e8243dbc68b7fc4aafc63578dcde9c18f61157553052a8467bc69377138cfed873995777f6c0476b24ee75c99a2904642c8bbd2e310faa6f958534f4143be179d349681f9853a1ac2e99d74fb1c8ee457425d8cc2915764929a9a7f9e7ca1d13b885ea8ca2e38a951e202534e51133ebaf05fc61c74bb2c24255304dd6b2e3dba37cd48c4040d55bb9eae5e4b169f73502ad839b8f59492d251d0074b7482171e1ae23"}, {0x1f0, 0x10d, 0x40d, "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"}], 0x16b0}, 0x20040080) write$cgroup_freezer_state(r1, &(0x7f00000000c0)='FROZEN\x00', 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r5, 0x125d, 0x0) fcntl$setflags(r5, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 530.570184][T25850] loop5: detected capacity change from 264192 to 0 [ 530.610371][T25851] loop1: detected capacity change from 259 to 0 [ 530.665418][T25851] BTRFS info (device loop1): has skinny extents 19:29:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:57 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e40000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:57 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, 0x0) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 530.936686][T25884] loop3: detected capacity change from 259 to 0 [ 530.947797][T25851] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 530.962330][T25851] BTRFS error (device loop1): failed to read the system array: -5 [ 530.962469][T25889] loop5: detected capacity change from 264192 to 0 19:29:57 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000001000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 531.054256][T25884] BTRFS warning: duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (25884) 19:29:57 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000002e80)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55, @ANYBLOB="2db85fe6ebb882e73590c8c14d8bcd1037ca38620ba6d43ec4d6bb4a53b2053fd86dc6b74b5964f0f8b21cab2a1819dbc29d911b9f05245b8b243987f62548a3dc6bed627da346e50809a3aea4b799c27614f86b2dabe875bd7705a19558059a4c006c7a599427da0afc150f23fb38e2bc7715b9061c3ab3ffac527272ed302cb827a2c0075924b9440805ad1b5aadf3b8e9b3eecbc6ca9c4e9c08d83657186141da82236ae9b99c217e890c46ab4927f546ca44fd2b4b464f095cafeed949abb79620815c9b0e43f395620feb5d8bc65a06722b052d729ab1974ede463059f9824850179e32e2e160237cd8f316335940a2acddd9c9c9238fbfdfdbde0a95b9297d1ff2589b5b7f1be27056b9be15e806000000642d7f6bb6fae34dbb074a7ff8ee9ab04c4cbc04f362276d2a43ca1aba02b6d721a9e3e093fbc12256100acdb94ddd36cdeaea5fe98d2a9b1e33ea7ff12cc0da7e67f840beb53f7fc26210872929b7af66709333ea9bdfd776b8b0b25b9030f5d2cf3fc2508dad8c0dd23465a4f7a0d7d4b92fbc7b8636518dfdeab391abaffd366fb0ee6ec8c5413d81ed01c50aa03b06b5ed6caad9f268c75143eb2bac7b3423d6d2618b7063bcb0e1c8b3578bba77e9952e3f7c80663624afcf6a10a7f872e4da12e43f9c2d3df760770a6276c0a67b6bd34f402f4d3e5abf5e45e3faffea44579427d8169776a1b9a867e94b6194ad1d0b9b250495dd76d5104bda55591dcf0f227aad34"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @multicast2}, 0x3}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000008c0)="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", 0x1000}], 0x1, &(0x7f0000003100)=[{0x40, 0x113, 0x4, "49a6b655c0c9b6dba3dcc38615a7c3127b12e059af04cff52662869f89c81a273c089947dd807ab684645414"}, {0xe8, 0x116, 0xffff, "49817d021ad23b08002000000000008d5bc5f84583f6d63cf05eea952ccc5a3d882558d2c95b9cadc8939457141e0cf9162311805b7183e566511f9b046b3345819620e8c36f6b3fb04317761f488783a703b5ecda194dbfc2f83d76ceef95825304b439e1b129f8824059609926eac7276600ecdf3f4d40f5924b1425897b5ccaf283a5e3e9e0ce0be7d4c7f885274c79e8d414bbe9f4fbaa80d47eaaa032a58efda0f112b6f71e2239d8b26c9139e77c9aba3aef44fd81b62dada5adb7ef82b8985f193efc86a3119184e78aded87e1d"}, {0xc8, 0x11, 0x9, "fb7f81466018394c99df2f65b42d02e8406f62b46f170feb4c4d7df2ff391db0a8f76c905a9482a86dcc2a23547f9ba91f69fe4ac96f0dfa3ec0fee69928c6d2370de4f9d1ba5e16fa1639b55aaf3f65c47155b29fc8fd6b950b75ead29ceb39e1203a4e25805f6bb546457b4b732bc04bab562ec2b75005eb7fe55797fc0410a9475e1c899522874d4b8672a78598e5de438cfec0a8be31a1b7ad257a77af56d60c9ec953bc1d16907293bb22598603f2"}, {0x1010, 0x0, 0x0, "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"}, {0x90, 0x10e, 0xb3a7, "0392a146c50cd8a7f06d9965f413de53646a5038adcb0bd13c9a24fb0bbb6715b3bee48e4e25bffc7bfdc225a9897d109ebaed381f00f22774e7ca378452bfd7593f3e856b0b535801b9b3d1c1066aa486888b793386115becba1d1e32205b51c8bd9b374bce41145cf95874deb6e8f3a989f00b7413ae0644ca73b7fba7"}, {0x18, 0x101, 0x3, "bb05f3"}, {0x80, 0x1, 0x5, "e043bbe522fbdb4a21fd7cb6e91486ea886692d4b51a8e80ccae141348ca87945fba0b0f450e99d2fb468d6358246d5cc27273988667fb0681604108cf9339cf8f7032c3eeaa14731145f6186b0fe3e44f24579bcdb0f3ae887f1c75652d7fc8daa174626428f1dfdbca0359ccbf3348"}, {0x88, 0xf0, 0xfffeffff, "6f863978cb15a7689653063667632f83d5b5e9b903aaa487b4206510123b6b5e7a9aa45aad290da256f07b23a69e09b6e27f91a4eaf823b9d6de195c4d4251fa714793a2f6b1c9ba04a6b060ad2e7dcefeab12a6b488c49f145c86087c948263188d3339c2ae3145b72e887dd082dd9f0d873b"}, {0x110, 0xe0d4acdb306aacd7, 0x5, "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"}, {0x1f0, 0x10d, 0x40d, "47d896da5ddb3bcef8e75347dc2431a79cb4176488f07ac42566816cc502711eaea6abc3777c59184d34be88cb31b4f5277214419ceacb0096bf62affa0ec1e718c3116302ba4bd6b703b1dd9329caa0d8262cb2e235e390956a2bf8585f7823fe718ad0911ed18bca7b75498b25a923ad55cb6365a80b59b12416f933f1348e43f46675604119760c21da6bb06b34350cca0f7c283c72a54eb7d169bd3d33bcfcf0f11fb9bfe3a6cb2a0d7f4bc55e236ebfbb6603945ab718f4c516f56d0d4ec74d2e8e3d68280473aa52b489505c19b5eeb6ca4bc278a52d9b3dd955624d97d9919196206837b5c4b6874e7df9830b13289376a8398a3c57e34a538b4c4e8f391c2b73415e71f7397103892c4cd98321e7694fc26aff7b9e2949d585aea73832cafcc49849c2a6f1f67e7c6e2dc733980d8dcc5703e42a53cf9b45bb37ff6c1959a1a106ce91a5746c71f548447b2ed0dabb1b7c84dd424ac8096c0019ed303bdd56f2e6bcc132f67ea028d841a815ffa54032837f703deafab72959fbea5cb997b8593d2e2674b1abe6127ec87e8eea5650875929be308f008519f8e01299a2eacf35f08681c98559c67243355c803f7f7d75829f44f8509bf30ce00eb3209706c77dca38ddca72d996b74061d557311436693538a46c6d7671a723ce93"}], 0x16b0}, 0x20040080) write$cgroup_freezer_state(r1, &(0x7f00000000c0)='FROZEN\x00', 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r5, 0x125d, 0x0) fcntl$setflags(r5, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:57 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, 0x0) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 531.252074][T25851] BTRFS error (device loop1): open_ctree failed 19:29:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000", 0x13, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:29:57 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xa103}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:29:57 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e40000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:57 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 531.568358][T25926] loop5: detected capacity change from 264192 to 0 19:29:58 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r1}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 531.777303][T25942] loop1: detected capacity change from 259 to 0 19:29:58 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r1}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 531.934798][T25942] BTRFS info (device loop1): has skinny extents [ 532.155784][T25942] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 532.179773][T25970] loop5: detected capacity change from 264192 to 0 [ 532.211755][T25942] BTRFS error (device loop1): failed to read the system array: -5 19:29:58 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r1}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:58 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xbd02}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 532.413889][T25942] BTRFS error (device loop1): open_ctree failed 19:29:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 532.572880][T25988] loop5: detected capacity change from 264192 to 0 [ 532.678748][T26004] loop1: detected capacity change from 256 to 0 [ 532.745420][T26004] BTRFS info (device loop1): has skinny extents [ 532.966844][T26004] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 532.993342][T26004] BTRFS error (device loop1): failed to read the system array: -5 19:29:59 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) fcntl$getown(r0, 0x9) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)=@xdp={0x2c, 0x4, r2, 0x17}, 0x80, &(0x7f0000000540)=[{&(0x7f00000008c0)="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", 0x1000}], 0x1, &(0x7f00000018c0)=[{0xe8, 0x84, 0x7, "57e8981264860f79ce13913a4dd9f305ed4519e3242bee8d2336f6fb666c0cbeaf4740fdd2d8dbfb236dd7232d14554d72141dbf79f3c390526ecf2d548e84c149c291ba0dd9890e14687db9c3c30a70e70f7f802a39e9e66f1e57820b797ad9ee0bd8218cc503261fbbb88b34bae439beeeca40ee934d9f48a1563d13443d30b6617be145961bc30d7101d25726ff9fd27f27dc7693580a6e0a148ce5f5347416038be2a2f71df64cfa22b073e604419faf817a2c998e50b859636392d2ed3a3edae2ec9a3a3efac51271fd159242550438c44cfc"}, {0xf0, 0x111, 0x200, "c91805479b134603e2db342cfe79b1870024bde5c371093e3e59062913096c4ee27ea5aa7d23692e77c69096d7b6456531472d75bf05e42d02a06b27de4771fce31577c66c570e5858a686a576ce05cc5fb2d5edb94f7ccd8aac1b16ffc3a0555d18ed1992f5eb33b93e12cbcd587e3bf5b489afb790bd1b6a21d7757305523344268dca7253a649bf53a008bdf0bedec509a66f12740de7adc54a49bac82fe614a35cca299fdc62606846747585fd76e5acd73afd9b05d9553fa72c1a29c8bd869c46986b5d86cdfb9eb967a9ef34f40c9063017a7cee8a65d8"}, {0xd8, 0x6, 0x80000001, "fd3b0ef917d719ae4228b9ad3b9c5beeff73301413f85d41f6ea97ab6e2109b3414602e4b1120d617a97c065ff44e6827462c224acb707089b529c977f2bdb14e34e55d5d749c616cc5747c08a933a6538cfc3f6b1cb50917b79ebd7fd5d3fd13e8caf3f065ddda81b2858cff5c24ab4a4088bd08084be4693f788b5268dad600cb059dc79a4c012cb24bb9b8b70e99cd38db3229c39f0a2af66d408190fbe315ed0ada46fb06879f3984c284ab9b80076dd3fbbba0c147ba0061ec2db7f4b0d977abfd0f25e"}, {0xd0, 0x119, 0x0, "f24b328ebcd4f836cfbf07a0b9b1c30baf6d560f026b378a11d73c06c77f8151cda4247daa32e182dd40cc2d1c2904a19caa42f00dd86233ef75d880976a8f100e9e924c0d5b144964a3a49af3d2b71efb7074026c3af7fd1475127421017914214c5b8ec9a64782787d23a307f762dcce6e85739893bb49a84ad317c418ba2ccc3cb1b867aa360054a63a335ac4d2352a4b40c00c430da595b43e37d4566e8394e582879d80e89b82e5415e1690d690b887e3c0fd7ffd70cd93"}, {0xc0, 0x110, 0x919, "2d61ada26045099352ca4a5444b874ef3607e1ad017ed814a35f617119cc4df8da76d6adc4eeb711c758ce84c56130db1a4800b9f4af95cec8da2226dbe7f2223f5d985cf0edb04579edab8a445a892d7672c473904f71418127198f2e84767089be55fdcad139d2289a8cf8c4866723a061a249739d2e9d1289496f8d39c7a192190319344bc00a6c736f07d9c083e112c04a507cd4f06dbdf850af1c2e8663c0ba9b12580d8c5f00e11dea14"}, {0x98, 0x11, 0x1, "7350673447a3f192c34257e8f3aa5934dfb868da36c990805878290d5476cfb5b2d1a85b6054b96a85038f2d5fad58de09b0ca97ca339aabe16233434b40a3fc124af37bab9077058898c26a2b9c7276fde305f51fe1a9cca47985a86e2df4806fcc218e41050f08056ab0f2b9ab5ebdaa53300ea17777a9f61403cea5a286386cb6"}], 0x4d8}, 0x8080) sendmsg$inet(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r3, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:59 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xbe03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:29:59 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, 0x0, 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:29:59 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:29:59 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/52], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 533.198815][T26004] BTRFS error (device loop1): open_ctree failed 19:29:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 533.345324][T26031] loop5: detected capacity change from 264192 to 0 19:29:59 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, 0x0, 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 533.571246][T26060] loop1: detected capacity change from 256 to 0 19:30:00 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/52], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 533.680897][T26060] BTRFS info (device loop1): has skinny extents 19:30:00 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="850000020803fcff7500ea8226223ce35079453e63cfbd94289789ab6d8000000000000000000000e40000000000000000000000000000913c01fae6d1ab0c12c11efaf598377b7f021893be41df00b650314300c2903c81700c498ca9be01f8c560b7431c110e7ba2776fac2026a99b4eccacf2169a96ab9eff9e9e1052b7cf076be1cb812f9af46b8019c1e9f194ed3efa1c00fed3c04538dc633e03fdc93bf3c56271d4a4117d40c306d253c12b44e733005c95a13e7f73ad7f6a83672b73878730cbd8277800797fe3f0991c017046486294e6edb62cdbbdeb264aa5e115ffecfd5be385b5a4c16de096"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/partitions\x00', 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000002c0)=@ipx={0x4, 0x6, 0x874a, "5589867a31c5", 0x6}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000540)="8b326c20d42d865c34dc031e35647940090d74d74d417b5bdb376d660727d4bec6a8fb33563ce74bff879cf50944ae79928fed8f3edc4be3d081957fd9e892f98ad01e90bf9a2aa4ab40e45f05a7448142a185a1d6fdf39e405b95bd94c09948f21064af147523cc3c66c547658140dca457a8672482d62b87e190bd426c27728bdc5a2c4069adab3ae3c95f858816bd7c811f47048f0e0d04ed5257", 0x9c}, {&(0x7f0000000600)="f1b8044c48c6d014ab6986b2ae2415e683c39fc064135136f224bb5c851bde4115f10b86be5643b255191de0d8233d126e5c456f18195434d696e721d0bd735169b5b8a63783a47e41f424acf684cd83cf69d5a22d595fc1ec9d16e14f7849d909bfe59d0b41e9937aaf23f29dec5891573ef3818e3b055a841b5a45ef07abc5f4a0a9dbec87f9c22737548ee10ec6e8a171df26177ee5140bee897a08d5ba6bfa68", 0xa2}, {&(0x7f00000003c0)="10c802bc983dc06038b6ede7ffab65b507302cd602924f2630e18d01821f40fbb768fb5eeb7ad027f995bb801a9e1d77713270196474e245497d15ff1e84585eb855c5d7ed171e112e4eb5", 0x4b}, {&(0x7f00000006c0)="de52f2a020f1c74cf24401fcf7c2dda32abb96d13b01249f84fef6e3de40e1bb345d9a7e9f1b174b5233ddbf0a5204dc61aa56a83f75ec41bc5a58db237af2554a89bc1f7ea51a7b8eb4", 0x4a}, {&(0x7f0000000740)="52327018c3da44991c099643b771fbf2c41780222a9eaf1805c824f0841dfdcefd4e4cc63b4a5acf0834ffaac73c2f76b5c7aa0ce7b022fe9367ad7fd522a1fd53c41e8aa172c7e8562559020cf06528f591f3906d763ae883f73d11ac920af15ea8ee94ced86d81c013ac739ab516ddea4ff160207dd68365f5b18c3e859552791a6ccb3ae38e8d60b305b0858aaa22960ef6f68e3c32c4d79558e0d74fce54822815d274b3587e6fa00069eb89f7f7a78e0b13963a0439965882", 0xbb}, {&(0x7f00000008c0)="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", 0xfa}, {&(0x7f0000000100)="093fa6f4f260813556245e3dc0d1d419e2cfade8a847ebe9efe3ce", 0x1b}, {&(0x7f00000009c0)="5e82d2dcd979470059a45efb6ab4e85bf62ce155ae790f46706ebddd7c43d7b0506421db34ca1eb933020bfddbf204c0de748e2c4c7c3369fa349f742b145b92057b28dc103356cfdbfe0d4eed8ee9753c8d5ae40cd453ce67fec063679ace72cdddaeb1d4a356856effba0782ccf639367febdda0caf836bd0bd72581a90793933ffb02d7ce8742cab1f811e88fc3a81581fe9abb7205e65ed062c8c32afa440197285193481429a7f9866748fda38e1e81bc381b5b44e647dcd4adc408a4b8e008bd7119946ab1b0f73d6dce29943801bd05e51e594530b6d1575ab8708252393dd1cdf98f9518b4f61d05bdda8877196cb5bf5583df4151e256d4fae2a3b683615768640061c2b3b624d3725b79a64d0f075c86fb1056f750339a2e2e8c7eb4d703302402fb385c42e37036fab378b1ba4faad32c72adc44698460114895d43756b88ed94bdb7a2d6d28b9070df8e3eb17215228e6cba321f00c5d85e0a463098a6187338a6a514d3479321b376504e5f9563d06f520131b384e73455934cb6347db35dee7a4f833f95ca8f4c6391776e533795c9065c9481cd4bfa392ccd0403a9f5ada81dcf4a27b95d7b1eac85bed4acc25615dab23958d314e895f26620a34763b760c30534b03fff103d20550066aad0a629ee03e6e79b33156ca8d2802a7c8426ee37f268e0e5694f344d29f66dd34be4d4e9c863d0e34ba017f95f6c15599a4e751fb02e4e8460e54b162c9ed1d9ee7f5191cf5eaebd64108504349f42c838ac25be5040dacebb99892ab8a3eec6a26894c85d8789923c389a68ac93baf9f69fc58df4e21b6bf783c2e65e762645197095dba9a192baa1a484b73e10118d4b8e6a8ec55f901b6a7ac0b9017211ee5592837f1614d2b0c3d6f863c7b46f3bca2eee2986033cb05fda381672c14461ca2f9057748422b3c0deebdf680ca04a646beb98e15aa1cfbbd9e3af695a5ee7b6ca017785cd0b8a21f8499079636d858066ad9a49b1f36056e1dfcf28e60b80e82db09780100bd6c0a817d0b395fb68829f2e6cb8b5def883c3d814bd547fc538f62cd595c3cba9a89349784ec11ebf6794f9fe91c2e9382c4943a617e1294d74f5925b678d02fc49698904f7345c43f383ea0341c69c1c8b8da5be06f1a528e691f15574219834872c1bdb64f675bcbf31fdac7c53a48f4f17c011811849794f797f07ded638f065da277969bfcd8eaa19d2588f5fc5652cfc1d2b054d176e13479ec18615932a4a99063f6ed8764212588ebbdc58f742e7be89701481031a0ff6a19bedcc9c83b274639659e82dcc4f5eed48f94b57ae4430be791e197eb56df2d7a6ca015b67a81ae42adf0201775bef70a68b58149eabd46f99ded9f8d055f0b9aeccfc36db95ac752c855d64beddd6a7ff1abfa5d5650d0ca94822e933fd4ba68a013a8329f2bdf0a618c0fe7472e014fb20bc7c2824c73fcf37236ee1157c6eab37e996fe21c23baac6ba298c05d5b8978f17cc010c8689df045ddf2de91d71eee92962d031f835783e306e294ed5c8e4be55060183bc7945d2d1c9c1a0941bc60f4d37ef2f6710207d9771e3c7c4992f352d5b99d5b0f154173b98bc0efbaaa1b73d1d2a76b10052cb4815501a3905ef0160e44ec4d3c3bfe35c9e18aaa720ec4366ea347a81263504cf7bf9bad483957e09389306755ac10c802e463de43996e98c05f852c8e8fc892fa7ca43d8819d065a1cc5e269d3e59cf1f1560ade6f86bb5d09d875a438364d4e15c2ff44193fb209ad96b5cec2e7edcabf2eee6e2d1c843d7366b351ed75b5e86d4d9ee9e388e5a20a3f03d66d590177a8b43f73579ac92b479e206e57b932a4a9ef47c317b85d2b4aecdf00926491d23a11b9b56c39a79bed8caa24573d7400c661cd188a29a3c721e6930a0cf3ccbdf5a6207bab5ea789feaf95cc34c806f19030559992ac88f9866438730e2801a7e5e6d95a1f00bc3829a4025fb4e889747e8c3ff9feec685359a9b81b6f07447070fce10c8e7a1199956c7adfaf28b558195e4aa8539d3fe8f53a4c3b93a84e4d49ca733adc626bb6f99d6e2eeec380da0fd8600f3cc8f6aff131f470f3ed4aa19ebb11e29907b39985665ee8a841be123404ae989a4bdfb2a0f196ff144db8516924b9a0df070c4e8c5f0a18641cd01a970e8ddcb62768dbebb79672ca0c8e349eda40768fae89400ab259e7004d5c02ef03a3b01ae3f2ddcaf273900736932b75fedf0071e3b49306df98542c18c1f59118e761b587f84d70539ab7cd9f605d33c3ad73a38b6326f114a483b025b4ca3268873577cb1b24b22376d49c6ceb75d2a6acc445c9961ff7a726741ed5e22a33eabb92f1af18883a362a8c3eb94668a168a9b0e7e815cb248ba1ee93ae38b399bfd2aaf04ccf189b1828f42581f97f19b9f2656e63eb77d725a15d5c113fc030118e0d691290c64fcf4e5f8206fe19961dd40bb1f30613d967e3f5c3be365ff1b8f417d29b6897e74a3a22a88b9e5c2bdfabcf84ddb1c9e71b72bd35191c334b24f93d355d1144e193d564da709cfe61d4f3c772a0b36dd33e807f6e543c36fee2b3c2139508a606ec1b2ccd9d3f4e59f9e21336d541fcb53f97abc65585a9ee7543f83f23ed6129bbad5a3c1ae281248086157e39c46bb324a4882c8288cdabd2ac90fb882e6d65f4eb11ddb19d5c7f72dcdfcf40f662c2d391ce8ece1094641a69c47ca2f4e10bd7a8b8d8afa81d3ceda027cb984a0615e55a81cab3b90dca6e8033da8ab037b1b795aee15f6b2e5aba3b7d0898d6cec730e55dbc2b728aaf6e538512f75d71db1099b0855eb824a60a6bae0d264aba6b522e03480b7a7da5d616d2f7194760bd928252fd072fa75cd2c48391e334fd04622aea4a5de3b7bb7588ff6dc4c5a70333570665846665febe5ed6a0a1140ae14fc2c3285b4aacd7c2e42f90684fa49fc8af746cb8f5daf110c44ccac72f8e0c64d5c36e8bb0735207927c5e1688e1ed4c3fabf87ea6efcea81522004b727ac133d312770c34798fb15c3d3ce615af2349966f95bbb626a8ec483c3e85c93820bedceb5f3ab48c602322f7c2c21ec0553563990422fa8693431bdaa83135fbc0a32bd4d19aa53935234e56aec3e5bb59b09c27212a10edd077e124bf3eb1a14b563b46d4962a9e96e1efb34823bd88f23e0581c9a7a045305c33984fa91654180285b7856789eb0f629c5c5e26af85f095de6dbc8f741ce54f86febb0de46beb5e80160035bac8672e7cb5d061fbd0162c564f6c44dcfd71aedbf662583b9dcda590b317a54497768dccc8e8316864da2faf44ca2674e1c9abcd9523967c290b82be7233a318e693e52797e7325f16d847877d4f0de8db53fed7175a10df6ffd600975c414b2f113c8e64b80118f530d9797ae82140b964d8278cfddef54e8eea3c804c3d2f1b5085bae5cd2472bcf253bebaa899e880d86433659cc03bfd400ece129ee8acbe9fbd63c5bfe95925eb66efe67eeb31cc9babb38cd90732f99dffe39c8a9a9f7bcbf7d08ddadedac1696366719f771f2a91072c0bff33e85805b840d9450da3c055f9920af3b448a222cc0bb5e672d84c5d8af8a67f5a92cc46a4a17a820759c3f8a668361896b449623800c62756c631583a2ab854ea630c300fc89137adece8c6bc533eeeebfc917ae66551511cfcaeba1e23bdaee33ebd3b60833f75044a41ab7e07ec5ae6af639bb8ed5bb7a624a74b95869b87a1c3063790231d1db33c5a351dbfd44db20b8e3a354666ff92b7ab1b0729e86ed951b71a3cf5ac009cdc0e25832b208382d94f4b09d1735bdb9ace2c5cda8782301d63834fbff59353912db1418bf946f55e5ac213f98d9a89479999211f93ca6700f54928a807674232dac7b17f975b3a52352e3766dce8360d0a0a808ba47627626ccd57322c653abfe53cc3369838112ffdbb6be1d12b64b60cf487b74c8e1703f4ac657958cf90c67b9e82706382bdb648675077138d331626cb76c8a439f3a0c90ec5fc6e0f8a00bf9f67355f4a80b2f2202067e53ba1b24fee99f5d83970514e219331edb7d9abada4d3d3e99009db8db699476ef86c561896a3ede39d292d6e1983ba4d6f0352ab1a3360d391a76ec468fd0529d16b83036512dd2609d17be858834077d153ec2f13e7d3a86b756f9f6a1531424e67eaf8a8e26c7d69fb556a0766f104ad9d6a040c8ec648faa8218af7fbb784f671e1565daec2f1aa54ec5e20d2bb55dee5b868c61785d7a4d36c41deb2a38038a7fba7b2ef3e7d765078d11f6ac7b31a07515d9fb56648c8f8d464c07c01dab65dcb98496028c368740e7ffc797e80b9c81355ca585d6735e73cff5b9c5bf844015d6217521f496ac5b744484aed01be2cbed22eabf4a37304b51a3c75378be52eb491c6cb73249332e8c8aa60f9acf2ef7208498094f99c7212840a3d4928509015f938ad7a534422d622326803d96652204ebefed9f68a41728f962a59e1a42534aae544fbb5ce04a39ed4219e3cc7ce4449cfc851bc120672f6cebde49184de02963d3795729baa32aaffed44a64698b98666a0ceb754195ef122e4c2a8aac244a599832a5dfacdae592b2b18d54822cc16641d8310b3b5e316937739baf88690c37feffff4a0f69a868ed46ea41d14a6213ade1fc1f04f9fb3eaf0de238ea4d58dba6a3cf878d65c57a47071a53e477b8ce9c5697fb8c6ded083f5f7191a0151bc76d9fc17de36ec861803a3b34a76dc151396f96a83bcfad57baf27d547cb36b952aa406adad57172716e91acc6a503e164fd63ab45c32094249c421511a8ec669ff0cd23009076cee9839618b9170bb48bb9010d00fa7b3d82a98b910c8c88fbb587a313ea2b1a81558298696ba4e4d4021a94364680f6d3cf4c16c9ee8a1e32d3b5908b2c6344a48a00abac7b308ba76a1121357c7727f934474c4d129ca1403a54945be081777874ed3221bbfd7d5ee90a66bbf5599217562044fa30cb36313931438ce23f9e3ba9d3ef1b0ed4a5b4bb43986b7a1085f49bb016bd1bf80d4f03974b79bd55b9a72adbf57bb0e8a8d21c70b337a0aa6154535c0568171f9dd92bacc713d4a5150fb33f4bd60ec27a27d3fca190fb3a88bb48cb83dc6b462e8f0452046fbb0c9e1a30335231dc9928c66ec8e31963af4a41fe733957fa923d4d519db0dc2f54331d0d932cfbed250eb6ceed57f31a4d9fc26b458bda1a168923169af26bc2b83eb3886fbb49cdcb5ea797ba2b16189f4546f68d1e8d881046ab9f854f37692f49a144b8e909a9509257b378bf3d0d4ef75ee1d338fc3c9129b444d464656852996a514810b29f32eb604f144b1ead53111da2ceced656e0a85293d4c024b0a8f86648e46d1cc87514f5f98aed558355366cf99e7573f9016ae2fc40b62405acbb85e1e0666d55c58e73ffd24e9f831c46dc8bed84904df59e425536ceadf55f038c7f7c215d8ae33601e6bebd8ac9b7bba876fcea345c9f95ea07d3f1528785c1079fa76fa0e10167595d142404af5ab0790b1e56e0d6b216d320abb16bffb006eeb2602877af661f1712cb0d6992fe34b71304ac370d3ee17580bb052639f6c3b7d60ef8c650e62b9cca10058618bd9dba62a044f3050474b151e814f5fb9a11b6a59839e5228c01aba8f33084fa89b36e4d86ddfab295c7325870abbfdd740dd0e277ebe2134855a57d45e1756fd3802c13ece92d3f283e90f7e2282549b7e466a03b282a8b3bb4aa7d380b06b5b78cb7a25fbe4b96d6a7e8bb9a1619c8d7f9b06d953ae0a474a8d", 0x1000}, {&(0x7f00000019c0)="6329b3d95efdd3e2d790a0705b8c8943e2f210a94bbb9ce1f309dbb54775cbbf2c407876669acb4665218c1147f433a4b9fca57f3658c6607f9090254412da03f6b631d8a6cc7b6647ba8fe507ae0989dd15a58f1eb54f08a07d97f842343e3d3521651046a4ac7c84f874d4f4ac3d9dee21eb7fde7f65edabb097756b572324bf060b2b21c7359db540c7f653ffece7fc082a6c7ddedc4d2218c2dcae38a450188a535dc0039eef034776fc9634959cf5fd92da6c1016a72bb2fb14c861fb073b5fd6d4669166e51f5f89c6b7c407fa1a42d9e87089bcf2", 0xd8}], 0x9, &(0x7f0000001b80)=[{0x100, 0x109, 0x5, "af3ceb8a04ad1e7543fbc6f7425ff58c1709b6967ac393e5b616ac71358b036db9396916771de38fdb96882ee853497f737edf0ccbbf56754cd13b2db823228377a78a46621360df85c1ce0b37cfffdbf4e19d13ed72dc70e0a208fdef4f0b4ecf3f1da010a73f54091e3c445081ea36c4d3e23ba313762504d2f3820fd91358dd8e990c80d77c1e96a1281c8b119ed83d66c155322cd4f35f97164a899da6064d4e093375aaf516e996394d37631ca41c3d30acc6563c8c24412c32f2b432fd2ec44a5b8d3a2f0fb8f3ba0f138bc249e7052569faa9686ec2e56c3624e1de4b9d5bda18fea1136dd4114d6adbcc"}, {0xd8, 0x109, 0x7b, "5f5ca61cb48f9a8d0b22bbb6d4f21ce6018f3dae645a4832da3eb3c4c8d8047603169fde96d96484e962c0d736b96dc1d2a9487669119538f88b4bfd783a6339aede2b21550bbd4111b2ff4ea866f36e548fc936698c872a2a32fa1d5e08b205723966af9b7a01f0c6568157f167298104a58a6feb122823ed28e75b348f96e28265f82ae0e70aa7aa72db146e03ae47b5e692b924cef4bf81a3e8351ff1ea55ce6995017839a384cce3e14473c826045112ef09d3feccaece9ac49aef08f0ed8cef7f1009"}, {0x58, 0x10c, 0x8, "d881d2e74d3664c8f3867d644df529dc7524d166f6648a1eddce9e14ab60d38d21a3bf5eb18b068aaf740d6b91f9d0547606edda86643733122415427f3fc16786"}, {0x78, 0x107, 0x9, "0c966cfe8ce39b6f67f9373621b4b05bfc6ea16b01a97a4aa6f00cb09b5dd59f98b474fd31801dddfb777a57581411b43c415e53f0b81491dec7afac803cdc4b0d1823f260d8b92419c873b52ee01992a10379fcb4995c3bb284b787401a143da87ed6f3"}, {0x100, 0x115, 0x21, "0f261e106bb942a95366e9b476323289bbd4e9756d09b43c9c767f05e4b74914a4b2b860053895dd6d1a4097b956bdb4536b2e014162fb57a33dea4ede4203eef9272c31dd716a46cebc02be28fdb1d262bd8a302e1aebdab076e643e59f6fa413067612b4ee13fc0fccb8babd4ab2c1feacc2aa5d2ac8aa0dacbabe7b35a58bf601ca4708b792ab0918b710fe8a4eb13a83ac72b31bb810c757b6433c5e15a71c00517b1217a5e5566d1ea030cb1c1e1ee1dbd88fe287c5e701ca24ae3d714374a901ded8fd926ea47c6ac5851a58a50c02a1bafa0c6da32c6bd2d2683610cf68f41ab3300f3c136c4c"}], 0x3a8}, 0x840) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:00 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xc003}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 533.886701][T26060] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 533.907321][T26060] BTRFS error (device loop1): failed to read the system array: -5 [ 533.918058][T26086] loop5: detected capacity change from 264192 to 0 19:30:00 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, 0x0, 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 534.096041][T26060] BTRFS error (device loop1): open_ctree failed 19:30:00 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1127004}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x800, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x7}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4008004) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) ioctl$TUNSETLINK(r4, 0x400454cd, 0x201) write$cgroup_int(r4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 534.347724][T26119] loop5: detected capacity change from 264192 to 0 19:30:00 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xdc01}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:00 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r2 = openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r2}, 0x78) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 534.542290][T26126] loop1: detected capacity change from 256 to 0 [ 534.653814][T26126] BTRFS info (device loop1): has skinny extents [ 534.843923][T26126] BTRFS error (device loop1): unexpected item type 0 in sys_array at offset 17 [ 534.868098][T26126] BTRFS error (device loop1): failed to read the system array: -5 [ 534.916701][T26126] BTRFS error (device loop1): open_ctree failed 19:30:01 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xdd00}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:01 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/52], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 535.248814][T26163] loop5: detected capacity change from 264192 to 0 19:30:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x0, 0x300) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:01 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 535.448715][T26172] loop1: detected capacity change from 259 to 0 [ 535.738297][T26184] loop3: detected capacity change from 259 to 0 19:30:02 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 535.787725][T26184] BTRFS info (device loop3): has skinny extents [ 535.815160][T26196] loop5: detected capacity change from 264192 to 0 19:30:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:02 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/54], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 535.963675][T26216] loop1: detected capacity change from 259 to 0 19:30:02 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xe603}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:02 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 536.049520][T26184] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 536.064454][T26184] BTRFS error (device loop3): failed to read the system array: -5 19:30:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 536.300612][T26184] BTRFS error (device loop3): open_ctree failed 19:30:02 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/54], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 536.365337][T26246] loop1: detected capacity change from 259 to 0 [ 536.406773][T26245] loop5: detected capacity change from 264192 to 0 19:30:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x0, 0x300) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:02 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xed03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:02 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 536.686208][T26261] loop3: detected capacity change from 259 to 0 [ 536.715234][T26266] loop1: detected capacity change from 259 to 0 [ 536.769390][T26261] BTRFS info (device loop3): has skinny extents 19:30:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 536.916046][T26283] loop5: detected capacity change from 264192 to 0 [ 537.009257][T26261] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 537.045798][T26261] BTRFS error (device loop3): failed to read the system array: -5 [ 537.158856][T26299] loop1: detected capacity change from 259 to 0 [ 537.195941][T26261] BTRFS error (device loop3): open_ctree failed 19:30:03 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r3 = perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f00000000c0)) r6 = openat$cgroup_ro(r5, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x7a05, 0x1700) write$cgroup_int(r6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:03 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xee00}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:03 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:30:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x0, 0x300) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:03 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/54], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 537.483459][T26319] loop3: detected capacity change from 259 to 0 [ 537.633046][T26324] loop1: detected capacity change from 259 to 0 [ 537.658377][T26331] loop5: detected capacity change from 264192 to 0 [ 537.670774][T26319] BTRFS info (device loop3): has skinny extents 19:30:04 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], 0x0, 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:04 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:04 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xee03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 538.033596][T26319] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 538.093814][T26319] BTRFS error (device loop3): failed to read the system array: -5 [ 538.127507][T26374] loop1: detected capacity change from 259 to 0 [ 538.151771][T26377] loop5: detected capacity change from 264192 to 0 19:30:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:04 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 538.373915][T26319] BTRFS error (device loop3): open_ctree failed [ 538.400688][T26387] loop1: detected capacity change from 259 to 0 [ 538.674390][T26395] loop5: detected capacity change from 264192 to 0 19:30:05 executing program 2: perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x1, 0x9, 0x8, 0xfa, 0x0, 0x4, 0x78a4bd39b9dd739, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x2, 0x227b687}, 0x400, 0x1, 0x1, 0x0, 0x6, 0xafe0c15d, 0x1000}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803e7e300610f33e364c11672d59a5079453e63cfbd94289789ab6d8000000000000000000000e4"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x1f, 0x7, 0x5, 0x21, 0x0, 0x1f, 0x9cc00, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x3, 0xc6, 0x9a8d, 0x9, 0x6, 0xfff, 0x4}, 0x0, 0xc, r5, 0x0) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:05 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xf102}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:05 executing program 5: pipe(&(0x7f00000000c0)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000001c0)=[{0x0, 0xff, 0x20, 0x200}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0x10, &(0x7f0000000f40)={&(0x7f0000000f00)=""/33, 0x21, 0x0}}, 0x10) r3 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r4 = openat(r3, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, r2, r4}, 0x78) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:30:05 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], 0x0, 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 538.999333][T26415] loop3: detected capacity change from 259 to 0 [ 539.038139][T26415] BTRFS info (device loop3): has skinny extents [ 539.045721][T26418] loop5: detected capacity change from 264192 to 0 [ 539.087022][T26419] loop1: detected capacity change from 259 to 0 [ 539.123954][T26426] device syzkaller1 entered promiscuous mode 19:30:05 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:05 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], 0x0, 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 539.251016][T26415] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 539.263066][T26415] BTRFS error (device loop3): failed to read the system array: -5 [ 539.369371][T26415] BTRFS error (device loop3): open_ctree failed 19:30:05 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xf202}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 539.550733][T26477] loop1: detected capacity change from 259 to 0 19:30:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 539.616669][T26477] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 0 transid 7 /dev/loop1 scanned by syz-executor.1 (26477) 19:30:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 539.837607][T26488] loop3: detected capacity change from 259 to 0 19:30:06 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000300)={&(0x7f0000000340)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000240)="c6bbce9c99a80e496a05", 0xa}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="140000000000000000000000020000003f000000000000007400000000000000000000000700ff00862c000000030606b0d3d7640611068f2b6f89ed27ff3bffce3b3cabaf000b5565cd0cc36eb7261d0104b65a00070b1ae000000264010102010717feac1414bb0a0101020a010101e00000017f00000107130f640101000a010100e0000002ac1414aa0000000000110000000000000000000000010000000600000000000000", @ANYRES64], 0xa8}, 0x20004040) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="850010020803fc3df9ff7500008326223c94289789ab6d8000000000000002000000e4000000000000000000001d00"/57], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r3 = socket$kcm(0x2, 0xa, 0x2) r4 = getpid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x20b76, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x0, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r4}]}, 0x3c}}, 0x0) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x7f, 0x73, 0x7f, 0x6, 0x0, 0x3f, 0x4bbd6b67e6f50acb, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x2}, 0x47400, 0xddd, 0x3, 0x3, 0x1ff, 0x1ff, 0x6}, r4, 0xa, 0xffffffffffffffff, 0x8) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 539.889941][T26488] BTRFS info (device loop3): has skinny extents [ 540.014084][T26504] loop1: detected capacity change from 259 to 0 [ 540.178698][T26488] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 540.269729][T26488] BTRFS error (device loop3): failed to read the system array: -5 [ 540.351872][T26488] BTRFS error (device loop3): open_ctree failed 19:30:06 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xf503}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 540.599122][T26504] BTRFS info (device loop3): has skinny extents 19:30:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:07 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 540.966511][T26504] BTRFS error (device loop3): open_ctree failed 19:30:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:07 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x5, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x5, 0x3}, 0x0, 0x0, &(0x7f0000000240)={0x5, 0x5, 0x0, 0x3}, &(0x7f00000002c0)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x437}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2}, 0x78) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 541.152554][T26570] loop5: detected capacity change from 259 to 0 [ 541.190403][T26579] loop3: detected capacity change from 259 to 0 [ 541.213496][T26579] BTRFS error (device loop1): invalid leafsize 0, should be 4096 [ 541.220168][T26570] BTRFS warning: duplicate device /dev/loop5 devid 1 generation 7 scanned by syz-executor.5 (26570) [ 541.266541][T26579] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 19:30:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 541.324969][T26579] BTRFS error (device loop1): invalid stripesize 0 [ 541.336493][T26579] BTRFS error (device loop1): system chunk array too small 0 < 97 [ 541.352400][T26579] BTRFS error (device loop1): superblock contains fatal errors 19:30:07 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:07 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xfa01}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 541.426591][T26579] BTRFS error (device loop1): open_ctree failed [ 541.445393][T26593] loop1: detected capacity change from 259 to 0 19:30:07 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$cgroup_ro(r4, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo\x00') ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000280)={0x2, &(0x7f0000000240)=[{0xe7b9, 0xf7, 0x20, 0x1}, {0x6, 0x0, 0x84, 0x200}]}) write$cgroup_int(r5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 541.557559][T26603] loop5: detected capacity change from 259 to 0 19:30:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:08 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 541.803697][T26628] loop1: detected capacity change from 259 to 0 [ 541.821174][T26628] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop1 scanned by syz-executor.1 (26628) [ 541.858279][T26632] loop3: detected capacity change from 259 to 0 [ 541.870072][T26637] loop5: detected capacity change from 259 to 0 [ 541.902817][T26637] BTRFS warning: duplicate device /dev/loop5 devid 1 generation 7 scanned by syz-executor.5 (26637) [ 541.925175][T26628] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 [ 542.003728][T26628] BTRFS error (device loop1): superblock contains fatal errors [ 542.029758][T26628] BTRFS error (device loop1): open_ctree failed 19:30:08 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 542.088693][T26632] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 19:30:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 542.138283][T26632] BTRFS error (device loop1): superblock contains fatal errors 19:30:08 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xfb01}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 542.238947][T26632] BTRFS error (device loop1): open_ctree failed 19:30:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:09 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x8, 0x0, 0xe5, 0x2, 0x0, 0x1, 0x20, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x5, 0x3393}, 0x488, 0xce, 0xfffffffd, 0x6, 0x6, 0xc2, 0x6}, r3, 0x6, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 542.728243][T26672] loop1: detected capacity change from 259 to 0 [ 542.795862][T26672] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 19:30:09 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 542.839619][T26684] loop3: detected capacity change from 259 to 0 [ 542.880097][T26672] BTRFS error (device loop1): superblock contains fatal errors [ 542.883797][T26688] loop5: detected capacity change from 259 to 0 [ 542.891469][T26672] BTRFS error (device loop1): open_ctree failed [ 542.906097][T26688] BTRFS warning: duplicate device /dev/loop5 devid 1 generation 7 scanned by syz-executor.5 (26688) [ 542.923570][T26684] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 19:30:09 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000001c0)=[{0x0, 0xff, 0x20, 0x200}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d00)={{{@in6=@ipv4={[], [], @empty}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000e00)=0xe8) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/nvram\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0x10, &(0x7f0000000f40)={&(0x7f0000000f00)=""/33, 0x21, 0x0}}, 0x10) r6 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r7 = openat(r6, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], r3, 0x24, r4, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, r5, r7}, 0x78) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:30:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 543.110641][T26684] BTRFS error (device loop1): superblock contains fatal errors [ 543.191827][T26684] BTRFS error (device loop1): open_ctree failed [ 543.282626][T26714] loop5: detected capacity change from 264192 to 0 [ 543.324969][T26713] loop1: detected capacity change from 259 to 0 [ 543.383970][T26713] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 19:30:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:09 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000001c0)=[{0x0, 0xff, 0x20, 0x200}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d00)={{{@in6=@ipv4={[], [], @empty}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000e00)=0xe8) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/nvram\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0x10, &(0x7f0000000f40)={&(0x7f0000000f00)=""/33, 0x21, 0x0}}, 0x10) r6 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r7 = openat(r6, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], r3, 0x24, r4, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, r5, r7}, 0x78) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 543.543084][T26713] BTRFS error (device loop1): superblock contains fatal errors [ 543.627375][T26728] loop3: detected capacity change from 259 to 0 [ 543.643727][T26713] BTRFS error (device loop1): open_ctree failed [ 543.687554][T26728] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 [ 543.704068][T26728] BTRFS error (device loop1): superblock contains fatal errors [ 543.713084][T26728] BTRFS error (device loop1): open_ctree failed [ 543.804997][T26736] loop5: detected capacity change from 264192 to 0 19:30:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:10 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xfc00}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:10 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000001c0)=[{0x0, 0xff, 0x20, 0x200}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d00)={{{@in6=@ipv4={[], [], @empty}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000e00)=0xe8) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/nvram\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0x10, &(0x7f0000000f40)={&(0x7f0000000f00)=""/33, 0x21, 0x0}}, 0x10) r6 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r7 = openat(r6, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], r3, 0x24, r4, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, r5, r7}, 0x78) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 544.026283][T26745] loop1: detected capacity change from 259 to 0 [ 544.039704][T26745] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 [ 544.057740][T26745] BTRFS error (device loop1): superblock contains fatal errors [ 544.068952][T26745] BTRFS error (device loop1): open_ctree failed [ 544.157358][T26751] loop3: detected capacity change from 259 to 0 19:30:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 544.199103][T26751] BTRFS info (device loop3): has skinny extents [ 544.349320][T26760] loop5: detected capacity change from 264192 to 0 [ 544.429608][T26773] loop1: detected capacity change from 259 to 0 [ 544.437714][T26751] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 544.475050][T26751] BTRFS error (device loop3): failed to read the system array: -5 [ 544.727600][T26751] BTRFS error (device loop3): open_ctree failed 19:30:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010000000100000001000006100000004000000000000000000000000000000000000000000000045030000000000000000000000010000000000000000000001000000000000720000000000", 0xe1, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 544.822436][T26773] BTRFS info (device loop3): has skinny extents [ 545.046655][T26809] loop5: detected capacity change from 259 to 0 [ 545.223504][T26773] BTRFS error (device loop3): open_ctree failed [ 545.255365][T26809] BTRFS info (device loop3): has skinny extents [ 545.502522][T26809] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 545.559313][T26809] BTRFS error (device loop3): failed to read the system array: -5 [ 545.742105][T26809] BTRFS error (device loop3): open_ctree failed 19:30:12 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x101000, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x1, 0x0, 0xffffffffc6553532, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400000000000000000000000000002da1254e9065b8f814639c5fb531c2c56f3b9634cca1628eea1ef91d7e3cccca1dbc3216080288fae8b9e5c103eda1072616a058ae0a000091aa1c39b8eedb44a142fdd7c0a74989e9a5dc31ccd4f50f52c298ff4d610861f1d99ff48f672847c10b3de9b6a0cd8bfd96c19c6600000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x80805, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x4, 0x0, 0x7, 0x7f, 0x0, 0x60, 0xc2820, 0xe, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80, 0xff}, 0x502, 0x1, 0x8, 0x0, 0x100000000, 0x8, 0x5}, 0x0, 0x3, r4, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:12 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xff00}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:12 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x0, 0x300) r5 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) fcntl$dupfd(r4, 0x406, r5) sendto$inet6(r1, &(0x7f0000000240)="d5789dfd1885e349925a2ac1a5aae0508b6706c9902aead293d83158219741ed6b4a32a49fc6", 0x26, 0x24000800, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @private0, 0x1}, 0x1c) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r1, 0x0, &(0x7f0000000180)={{r6, r7+10000000}, {0x77359400}}, &(0x7f0000000300)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 546.038330][T26854] loop1: detected capacity change from 259 to 0 19:30:12 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 546.099921][T26853] loop3: detected capacity change from 259 to 0 [ 546.151432][T26862] loop5: detected capacity change from 259 to 0 [ 546.171681][T26854] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 [ 546.203458][T26862] BTRFS warning: duplicate device /dev/loop5 devid 1 generation 7 scanned by syz-executor.5 (26862) 19:30:12 executing program 5: pipe(&(0x7f00000000c0)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000001c0)=[{0x0, 0xff, 0x20, 0x200}]}, 0x10) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 546.262512][T26854] BTRFS error (device loop1): superblock contains fatal errors [ 546.302985][T26854] BTRFS error (device loop1): open_ctree failed [ 546.314777][T26853] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 [ 546.381415][T26853] BTRFS error (device loop1): superblock contains fatal errors 19:30:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 546.424941][T26882] loop5: detected capacity change from 264192 to 0 [ 546.536145][T26853] BTRFS error (device loop1): open_ctree failed [ 546.622314][T26893] loop1: detected capacity change from 259 to 0 19:30:13 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289791ab6d8000000000000003000000e400000000010000000000000007e9a8350964c425b945cf988578b7e34520a05cc3e70d34d9f646262e9510b3411faf89203beb6fdacd5dbe1962a582721abe1bfdbbe2b50d0e661fcb1e00227d3b6dd4c3c3c4fb4f0af3f313ff0000000400"/155], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000002c0)=@ll={0x11, 0x15, r3, 0x1, 0x4, 0x6, @random="c5fa46c99b82"}, 0x80, &(0x7f0000000240)=[{&(0x7f00000004c0)="2b6332bad75c6d5a29ae2b3551df87428cff09b3763e839472c2cc55d22928da7d47ddd6ad2664758f8a9da3a9dc6c144a512380aee614d0051f8a85a41102b1cfef5a3d3a9e1843823b8f94e2b4e4ec8176071af992f69e93a299c1a0cadcc87bfb54fcc4b74097304debbcb4d8e63b76fd1ba4c89f7993b1f9d327d74c75b31a5bd2ad2f22d426e5caa39f3f1f752f2175093ac6462a0ada899c43bc07e8586cc046db9073ec57747d31af9516dd02e638159c26c33d0839ace75815c6b9dfc21187c534a314738638983ec5624b9030fe23183c54d2a2b6c8350f8780ba2e613226e63279ed6467aa3c1bcb02095d3af7772d035a", 0xf6}, {&(0x7f00000005c0)="96603a25bf7336ce5b9c3af5d7aec3dc97c5b26bea19e6144e04be0c72b56fb3f3c302b8591be75d3960ff78bf2f860a0ce236465b13598861e1af25f86b7e58ba70f91cfac14b1b9a1e19171dbd1f68d6b1e060669f4a03c783c3e3cb1f864a", 0x60}, {&(0x7f0000000640)="4c1475081da24cdce6bf07ae589db71cf5714550bd3c363e6c9545a2eee8037a7507d65b1f910135e9fe91926a7a85872ff33b432cc8d541e83e702b4781f6617fe801a9360f8ada42afee5f133e4ec2fc01d780dde5772a20b013481b5c8b66898c5c04317b49c9de4572c6287498b71a72a548e4d50b918b5b9ac7e36006f6fddec5f113a218e234390fb557c3d69b2f539fbb51df6e93baf63d888ff6da24a4bb292239b26c7a7487b75be17578637018a1a727fd4637bea9fe5879f8b947dfcec346582f988f81b77358368816a26ac6b7e1eabb44824b510d1aa5a25778040f07ed67416dbc90dcb3", 0xeb}], 0x3, &(0x7f0000000740)=[{0xf8, 0x112, 0x4, "145ee658a14eb580dc825dcbae35815b205026493576ae96cad35602072756c31b6954797025f28a451d4cc2979a13e364d00bd42c8b8cac56e21b21ad4312af1bfece97b2f500299932a40a3386050fe00182f267d615d91564d583203d2a846d384e8202adffef8dd9ca527c32e23ce16148449607183f3e6fc7d3014d20116957d924c0fb9c6f048f26c0a4b6823bb35f81809287004616720ee7661ddcdf295e43ea3ff40792a317ab0b7b98baff07a64db105c0a6703b82be0f5a4f4e933db28ff007c9cd8d292af763b8aec27adad21d849012367eaa2b5ef3447c48d4e35359"}], 0xf8}, 0x40000) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x0, 0x5}, 0x2200, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 546.732800][T26893] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop1 scanned by syz-executor.1 (26893) 19:30:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:13 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0xff02}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 546.971936][T26893] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 [ 547.008663][T26893] BTRFS error (device loop1): superblock contains fatal errors [ 547.024460][T26893] BTRFS error (device loop1): open_ctree failed [ 547.219835][T26917] loop3: detected capacity change from 259 to 0 [ 547.361847][T26917] BTRFS info (device loop3): has skinny extents [ 547.603139][T26917] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 547.625371][T26917] BTRFS error (device loop3): failed to read the system array: -5 [ 547.712250][T26917] BTRFS error (device loop3): open_ctree failed 19:30:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:14 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:14 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:14 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x4, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, r4, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000380)='FROZEN\x00', 0x7) socket$kcm(0x29, 0x6, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)=0x7, 0x12) 19:30:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:14 executing program 5 (fault-call:5 fault-nth:0): pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 548.205778][T26954] loop1: detected capacity change from 259 to 0 [ 548.259639][T26957] loop3: detected capacity change from 259 to 0 [ 548.300957][T26954] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 [ 548.452405][T26954] BTRFS error (device loop1): superblock contains fatal errors [ 548.475952][T26976] loop5: detected capacity change from 264192 to 0 [ 548.491951][T26954] BTRFS error (device loop1): open_ctree failed [ 548.506664][T26957] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 19:30:14 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 548.591519][T26981] FAULT_INJECTION: forcing a failure. [ 548.591519][T26981] name failslab, interval 1, probability 0, space 0, times 0 [ 548.678340][T26957] BTRFS error (device loop1): superblock contains fatal errors [ 548.693936][T26981] CPU: 1 PID: 26981 Comm: syz-executor.5 Not tainted 5.11.0-rc6-syzkaller #0 [ 548.703117][T26981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.713377][T26981] Call Trace: [ 548.716769][T26981] dump_stack+0x137/0x1be [ 548.721262][T26981] should_fail+0x384/0x4b0 [ 548.725718][T26981] ? getname_flags+0xba/0x640 [ 548.730702][T26981] should_failslab+0x5/0x20 [ 548.735327][T26981] kmem_cache_alloc+0x62/0x2e0 [ 548.740253][T26981] getname_flags+0xba/0x640 [ 548.744810][T26981] do_sys_openat2+0x5b/0x380 [ 548.749729][T26981] __x64_sys_openat+0x1c8/0x1f0 [ 548.754623][T26981] do_syscall_64+0x2d/0x70 [ 548.759068][T26981] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 548.765447][T26981] RIP: 0033:0x465b09 [ 548.769381][T26981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 548.789465][T26981] RSP: 002b:00007f18629f6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 548.797915][T26981] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000465b09 [ 548.805922][T26981] RDX: 0000000000000000 RSI: 0000000020000340 RDI: ffffffffffffffff [ 548.814091][T26981] RBP: 00007f18629f61d0 R08: 0000000000000000 R09: 0000000000000000 19:30:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x119, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 548.822259][T26981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 548.830276][T26981] R13: 00007ffc6a77e89f R14: 00007f18629f6300 R15: 0000000000022000 19:30:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:15 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 549.307481][T26957] BTRFS error (device loop1): open_ctree failed 19:30:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:15 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 549.469175][T26997] loop5: detected capacity change from 264192 to 0 [ 549.507015][T27000] loop1: detected capacity change from 259 to 0 [ 549.528284][T22692] Bluetooth: hci3: command 0x0406 tx timeout [ 549.955600][T27000] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != f90cac8b-044b-4f00-0000-000000000000 19:30:16 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup(r0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 550.021660][T27000] BTRFS error (device loop1): superblock contains fatal errors [ 550.043490][T27000] BTRFS error (device loop1): open_ctree failed [ 550.163771][T27021] loop3: detected capacity change from 259 to 0 19:30:16 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:16 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 550.225157][T27021] BTRFS info (device loop3): has skinny extents [ 550.264825][T27031] loop5: detected capacity change from 264192 to 0 19:30:16 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r5, 0x125d, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x81004, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@posixacl='posixacl'}, {@version_9p2000='version=9p2000'}, {@noextend='noextend'}, {@fscache='fscache'}], [{@fsmagic={'fsmagic'}}, {@fowner_gt={'fowner>', 0xee01}}, {@subj_user={'subj_user', 0x3d, '%:\xad{()}r'}}, {@dont_measure='dont_measure'}, {@subj_user={'subj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x31, 0x34, 0x62, 0x65, 0x34, 0x61, 0x35], 0x2d, [0x35, 0xde2377d390f159dc, 0x31, 0x33], 0x2d, [0x39, 0x39, 0x39, 0x61], 0x2d, [0x64, 0x30, 0x38, 0x30], 0x2d, [0x65, 0x33, 0x62, 0x65, 0x35, 0x38, 0x35, 0x33]}}}]}}) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:16 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x4, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 550.472384][T27052] loop1: detected capacity change from 259 to 0 19:30:16 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 550.538929][T27021] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 550.568890][T27052] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (27052) [ 550.590859][T27021] BTRFS error (device loop3): failed to read the system array: -5 [ 550.708930][T27021] BTRFS error (device loop3): open_ctree failed 19:30:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 550.830806][T27075] loop5: detected capacity change from 264192 to 0 19:30:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 550.988317][T27087] loop1: detected capacity change from 259 to 0 19:30:17 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x6, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 551.059028][T27092] loop3: detected capacity change from 259 to 0 19:30:17 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 551.138008][T27087] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != f90cac8b-044b-4fa8-8bee-4b8d00000000 [ 551.138191][T27092] BTRFS warning: duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (27092) [ 551.154194][T27087] BTRFS error (device loop1): superblock contains fatal errors 19:30:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 551.311863][T27087] BTRFS error (device loop1): open_ctree failed 19:30:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 551.438693][T27115] loop5: detected capacity change from 264192 to 0 [ 551.459541][T27117] loop3: detected capacity change from 259 to 0 [ 551.548605][T27117] BTRFS info (device loop3): has skinny extents [ 551.572810][T27126] loop1: detected capacity change from 259 to 0 19:30:17 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x7, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 551.602052][T27126] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (27126) [ 551.744223][T27117] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 551.766546][T27117] BTRFS error (device loop3): failed to read the system array: -5 [ 551.881310][T27147] loop5: detected capacity change from 264192 to 0 [ 551.972911][T27117] BTRFS error (device loop3): open_ctree failed 19:30:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d", 0x127, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:18 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:18 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x331880, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="8500000265127a45f65076cbd30723d7b5f2640803fcff7500008326223ce35079453e63cfbdc1b6192aab6d80000000000000ff0000000000200000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.events\x00', 0x100002, 0x0) socketpair(0x25, 0x80004, 0x7, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000003c0)={0x0, 0x0, 0x2, 0x0, [], [{0x0, 0x1, 0x3, 0x3, 0x4, 0xfffffffffffffff8}, {0x101, 0x64f7305, 0x0, 0x76, 0xfff, 0x6}], [[], []]}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:18 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:18 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x18, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:18 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 552.252202][T27165] loop1: detected capacity change from 259 to 0 [ 552.325292][T27165] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != f90cac8b-044b-4fa8-8bee-4b8d00000000 [ 552.348354][T27178] loop5: detected capacity change from 264192 to 0 19:30:18 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 552.382350][T27183] loop3: detected capacity change from 259 to 0 [ 552.404562][T27165] BTRFS error (device loop1): superblock contains fatal errors [ 552.433147][T27183] BTRFS warning: duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (27183) 19:30:18 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfad94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f0000000240)) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 552.502773][T27165] BTRFS error (device loop1): open_ctree failed 19:30:18 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:18 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x600, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:18 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @remote, 0x8}, 0x1c) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x129, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:19 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 552.783091][T27216] loop5: detected capacity change from 264192 to 0 [ 552.845631][T27219] loop3: detected capacity change from 259 to 0 [ 552.908390][T27226] loop1: detected capacity change from 259 to 0 [ 552.930845][T27219] BTRFS info (device loop3): has skinny extents [ 552.947866][T27226] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (27226) 19:30:19 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x700, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:19 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x129, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 553.164676][T27219] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 553.214413][T27256] loop5: detected capacity change from 264192 to 0 [ 553.215115][T27219] BTRFS error (device loop3): failed to read the system array: -5 19:30:19 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1800, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 553.332423][T27261] loop1: detected capacity change from 259 to 0 [ 553.351741][T27219] BTRFS error (device loop3): open_ctree failed [ 553.393756][T27261] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != f90cac8b-044b-4fa8-8bee-4b8d3da80000 [ 553.453077][T27261] BTRFS error (device loop1): superblock contains fatal errors [ 553.491225][T27261] BTRFS error (device loop1): open_ctree failed 19:30:20 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:20 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:20 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:20 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="050000020803fcff7500008326223ce35079455f63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)=@ipmr_newroute={0x28, 0x18, 0x401, 0x0, 0x0, {0x80, 0x20}, [@RTA_METRICS={0x4}, @RTA_PRIORITY={0x8}]}, 0x28}}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000240)={r5, r3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x240, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x7a05, 0x1700) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x129, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 553.897862][T27288] loop5: detected capacity change from 264192 to 0 [ 553.930829][T27289] loop3: detected capacity change from 259 to 0 [ 553.952131][T27289] BTRFS info (device loop3): has skinny extents [ 554.076757][T27315] loop1: detected capacity change from 259 to 0 19:30:20 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1f00, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 554.129013][T27289] BTRFS error (device loop3): invalid number of stripes 0 in sys_array at offset 17 [ 554.150210][T27315] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (27315) [ 554.155261][T27289] BTRFS error (device loop3): failed to read the system array: -5 19:30:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88d", 0x12a, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 554.330803][T27289] BTRFS error (device loop3): open_ctree failed [ 554.365899][T27334] loop5: detected capacity change from 264192 to 0 19:30:20 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 554.460060][T27341] loop1: detected capacity change from 259 to 0 19:30:20 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x12}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:20 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 554.548241][T27341] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != f90cac8b-044b-4fa8-8bee-4b8d3da88d00 [ 554.579350][T27345] loop3: detected capacity change from 259 to 0 [ 554.629693][T27341] BTRFS error (device loop1): superblock contains fatal errors 19:30:21 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 554.768055][T27341] BTRFS error (device loop1): open_ctree failed [ 554.775602][T27355] loop5: detected capacity change from 264192 to 0 19:30:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12a, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:21 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x2000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:21 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x41}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 555.518442][T27378] loop1: detected capacity change from 259 to 0 [ 555.554640][T27374] loop3: detected capacity change from 259 to 0 [ 555.578414][T27380] loop5: detected capacity change from 264192 to 0 [ 555.656262][T27378] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != f90cac8b-044b-4fa8-8bee-4b8d3da88d00 19:30:22 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:22 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:22 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 555.758766][T27378] BTRFS error (device loop1): superblock contains fatal errors [ 555.820468][T27378] BTRFS error (device loop1): open_ctree failed 19:30:22 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x4000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88d", 0x12a, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 556.009935][T27405] loop3: detected capacity change from 259 to 0 19:30:22 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:22 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 556.259466][T27420] loop1: detected capacity change from 259 to 0 [ 556.274504][T27422] loop5: detected capacity change from 264192 to 0 [ 556.310152][T27420] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != f90cac8b-044b-4fa8-8bee-4b8d3da88d00 19:30:22 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x65}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 556.411033][T27432] loop3: detected capacity change from 259 to 0 [ 556.446824][T27420] BTRFS error (device loop1): superblock contains fatal errors 19:30:22 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x6000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 556.535500][T27420] BTRFS error (device loop1): open_ctree failed 19:30:22 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 556.752024][T27444] loop3: detected capacity change from 259 to 0 [ 556.778257][T27448] loop1: detected capacity change from 259 to 0 [ 556.797353][T27447] loop5: detected capacity change from 264192 to 0 19:30:23 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x78}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:23 executing program 2: setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0, 0x4}, 0x8) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:23 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:23 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x7000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:23 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 557.344840][T27480] loop1: detected capacity change from 259 to 0 [ 557.366263][T27479] loop3: detected capacity change from 259 to 0 [ 557.383921][T27478] loop5: detected capacity change from 264192 to 0 19:30:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:23 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:23 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x18000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 557.665250][T27505] loop1: detected capacity change from 259 to 0 19:30:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:30:24 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1f000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:24 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7b}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:24 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2200002, &(0x7f0000000380)=ANY=[]) [ 557.970858][T27517] loop1: detected capacity change from 259 to 0 [ 558.068259][T27523] loop5: detected capacity change from 264192 to 0 [ 558.100919][T27517] BTRFS info (device loop1): has skinny extents [ 558.409367][T27517] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 558.423782][T27517] BTRFS error (device loop1): failed to read the system array: -5 [ 558.458271][T27517] BTRFS error (device loop1): open_ctree failed 19:30:25 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d800000000000051d000000e40000000001000000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000380)='FROZEN\x00', 0xfdef) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'xfrm0\x00', @local}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:25 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1000000000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:25 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, 0x0) 19:30:26 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:26 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xdd}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 559.676732][T27568] loop5: detected capacity change from 264192 to 0 [ 559.686464][T27569] loop1: detected capacity change from 259 to 0 19:30:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, 0x0) 19:30:26 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x100000000000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:26 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 559.857488][T27589] loop1: detected capacity change from 259 to 0 19:30:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, 0x0) [ 559.948840][T27596] loop5: detected capacity change from 264192 to 0 [ 560.015909][T27598] loop3: detected capacity change from 256 to 0 [ 560.110441][T27605] loop1: detected capacity change from 259 to 0 [ 560.124717][T27598] BTRFS info (device loop3): has skinny extents 19:30:26 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x200000000000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12a, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 560.372024][T27598] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 560.393806][T27598] BTRFS error (device loop3): failed to read the system array: -5 [ 560.394266][T27633] loop1: detected capacity change from 259 to 0 [ 560.441415][T27636] loop5: detected capacity change from 264192 to 0 [ 560.542279][T27633] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (27633) [ 560.608506][T27598] BTRFS error (device loop3): open_ctree failed 19:30:27 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:27 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xee}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:27 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x400000000000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:27 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:27 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="050000020803fcff7500008326223ce35079455f63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)=@ipmr_newroute={0x28, 0x18, 0x401, 0x0, 0x0, {0x80, 0x20}, [@RTA_METRICS={0x4}, @RTA_PRIORITY={0x8}]}, 0x28}}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000240)={r5, r3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x240, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x7a05, 0x1700) write$cgroup_int(r7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:27 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="440000020803fcff7500008326223ce35bbd51c8ee6e3f966e895079453e63cfbd94289789ab6d8000080000000000000000e400"/65], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'macsec0\x00', @remote}) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r5, 0x125d, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f00000003c0)=ANY=[@ANYBLOB="02007b00368ea85e656e2d5c3bd76a335d1bdf3f3d6551dc0439b9d6aaab237fb96e4ea68c809df737f6e5aedc9a5b8772820a52db6182ad4b47635cd2e893348156ef0a45cd2ccaae04a9285bac3349ddb919981396cb363d7f3ddd0f6f94075d4b9441ebb96395a8cb2e943419219e4234a6eb28d140bf4b031e2a493bc03b9fa1f57a14bbadd4157e70697da6731b8a6540e595d6a5fb1469598fce892c244fdd923e6c035100b61e2b8ebae100d671e9df3fdd93469c7e8c20105f10d1c53589b890099528c69391e8e119742f482c9549f8b88c29aba382c0e5f053f13e3651e2705bcd"]) write$cgroup_int(r4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 561.126716][T27661] loop5: detected capacity change from 264192 to 0 [ 561.199176][T27662] loop3: detected capacity change from 256 to 0 [ 561.251720][T27662] BTRFS info (device loop3): has skinny extents 19:30:27 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x600000000000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 561.546119][T27704] loop5: detected capacity change from 264192 to 0 [ 561.576199][T27662] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 19:30:28 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfc}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 561.669501][T27662] BTRFS error (device loop3): failed to read the system array: -5 [ 561.822138][T27662] BTRFS error (device loop3): open_ctree failed 19:30:28 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x700000000000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:28 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:28 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x11a}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 562.135896][T27723] loop3: detected capacity change from 256 to 0 [ 562.161548][T27724] loop5: detected capacity change from 264192 to 0 [ 562.232356][T27723] BTRFS info (device loop3): has skinny extents [ 562.299933][T27723] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 562.309736][T27723] BTRFS error (device loop3): failed to read the system array: -5 [ 562.362845][T27723] BTRFS error (device loop3): open_ctree failed 19:30:28 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1800000000000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 562.992346][T27757] loop5: detected capacity change from 264192 to 0 19:30:30 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:30 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x136}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:30 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0, 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:30 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1f00000000000000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 564.046293][T27776] loop3: detected capacity change from 259 to 0 [ 564.072310][T27776] BTRFS info (device loop3): has skinny extents [ 564.097351][T27778] loop5: detected capacity change from 264192 to 0 [ 564.157065][T27776] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 564.166734][T27776] BTRFS error (device loop3): failed to read the system array: -5 [ 564.347732][T27776] BTRFS error (device loop3): open_ctree failed 19:30:31 executing program 1: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:31 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:31 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {0x0, 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:31 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x141}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:31 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x93c, 0xf8, 0x2, 0x1}, {0x5, 0xa9, 0x4, 0x5}, {0x104, 0x73, 0x18, 0xffffff81}]}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:31 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 564.995212][T27818] loop5: detected capacity change from 264192 to 0 19:30:31 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 565.041183][T27820] loop3: detected capacity change from 259 to 0 [ 565.090835][T27820] BTRFS info (device loop3): has skinny extents [ 565.298941][T27852] loop5: detected capacity change from 264192 to 0 [ 565.338271][T27820] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 565.348735][T27820] BTRFS error (device loop3): failed to read the system array: -5 [ 565.497061][T27820] BTRFS error (device loop3): open_ctree failed 19:30:31 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x6) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:32 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {0x0, 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:32 executing program 1: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:32 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1dc}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 565.823754][T27875] loop5: detected capacity change from 264192 to 0 [ 565.872495][T27880] loop3: detected capacity change from 259 to 0 [ 565.894746][T27880] BTRFS info (device loop3): has skinny extents 19:30:32 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 566.108605][T27897] loop5: detected capacity change from 264192 to 0 [ 566.140314][T27880] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 566.171140][T27880] BTRFS error (device loop3): failed to read the system array: -5 19:30:32 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 566.246776][T27880] BTRFS error (device loop3): open_ctree failed 19:30:32 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0), 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:32 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1fa}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 566.691366][T27918] loop3: detected capacity change from 259 to 0 [ 566.776701][T27922] loop5: detected capacity change from 264192 to 0 [ 566.804969][T27918] BTRFS info (device loop3): has skinny extents [ 566.883743][T27933] loop1: detected capacity change from 259 to 0 [ 566.908242][T27933] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (27933) [ 567.085412][T27918] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 567.116526][T27918] BTRFS error (device loop3): failed to read the system array: -5 [ 567.269010][T27918] BTRFS error (device loop3): open_ctree failed 19:30:33 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000d, 0x100010, r4, 0x9) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:33 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:33 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x600) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:33 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0), 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:33 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1fb}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 567.531042][T27968] loop3: detected capacity change from 259 to 0 [ 567.573723][T27972] loop1: detected capacity change from 259 to 0 [ 567.624442][T27975] loop5: detected capacity change from 264192 to 0 19:30:34 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x700) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 567.965714][T27972] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (27972) [ 567.980093][T27968] BTRFS info (device loop3): has skinny extents 19:30:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x127, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 568.095893][T27968] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 568.126687][T27968] BTRFS error (device loop3): failed to read the system array: -5 [ 568.190775][T27968] BTRFS error (device loop3): open_ctree failed 19:30:34 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x25e}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:34 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:34 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0), 0x0, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 568.438367][T28025] loop1: detected capacity change from 259 to 0 [ 568.463867][T28024] loop5: detected capacity change from 264192 to 0 [ 568.482968][T28025] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != f90cac8b-044b-4fa8-8bee-4b8d00000000 19:30:34 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x1800) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 568.588090][T28025] BTRFS error (device loop1): superblock contains fatal errors [ 568.614631][T28038] loop3: detected capacity change from 259 to 0 [ 568.641758][T28025] BTRFS error (device loop1): open_ctree failed [ 568.698795][T28045] loop5: detected capacity change from 264192 to 0 [ 568.732057][T28038] BTRFS info (device loop3): has skinny extents [ 568.883388][T28038] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 568.918006][T28038] BTRFS error (device loop3): failed to read the system array: -5 [ 569.079475][T28038] BTRFS error (device loop3): open_ctree failed 19:30:36 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:36 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x1f00) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4f", 0x122, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:36 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x26e}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:36 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)='\x00'/10, 0xa, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:36 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 569.887660][T28093] loop1: detected capacity change from 259 to 0 [ 569.932548][T28092] loop5: detected capacity change from 264192 to 0 [ 569.945566][T28095] loop3: detected capacity change from 259 to 0 [ 569.974717][T28093] BTRFS error (device loop1): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != f90cac8b-044b-4f00-0000-000000000000 [ 570.020960][T28095] BTRFS warning: duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (28095) [ 570.127589][T28093] BTRFS error (device loop1): superblock contains fatal errors 19:30:36 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x1000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:36 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)='\x00'/10, 0xa, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 570.248801][T28093] BTRFS error (device loop1): open_ctree failed 19:30:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x122, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:36 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x276}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 570.496378][T28129] loop3: detected capacity change from 259 to 0 [ 570.544493][T28130] loop5: detected capacity change from 264192 to 0 [ 570.553342][T28133] loop1: detected capacity change from 259 to 0 [ 570.629697][T28133] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (28133) [ 570.649296][T28129] BTRFS info (device loop3): has skinny extents 19:30:37 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x2000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:37 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 570.895563][T28129] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 570.907619][T28129] BTRFS error (device loop3): failed to read the system array: -5 [ 570.915914][T28161] loop5: detected capacity change from 264192 to 0 [ 571.055662][T28129] BTRFS error (device loop3): open_ctree failed [ 571.383425][T28173] FAULT_INJECTION: forcing a failure. [ 571.383425][T28173] name failslab, interval 1, probability 0, space 0, times 0 [ 571.428876][T28173] CPU: 0 PID: 28173 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 571.440386][T28173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.451005][T28173] Call Trace: [ 571.454335][T28173] dump_stack+0x137/0x1be [ 571.458895][T28173] should_fail+0x384/0x4b0 [ 571.463386][T28173] ? __se_sys_memfd_create+0xfb/0x4b0 [ 571.468799][T28173] should_failslab+0x5/0x20 [ 571.473515][T28173] __kmalloc+0x84/0x330 [ 571.477894][T28173] ? strnlen_user+0x1a7/0x260 [ 571.482835][T28173] __se_sys_memfd_create+0xfb/0x4b0 [ 571.488256][T28173] do_syscall_64+0x2d/0x70 [ 571.493124][T28173] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 571.499416][T28173] RIP: 0033:0x465b09 [ 571.503463][T28173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.524505][T28173] RSP: 002b:00007f2f9b1b9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 571.533459][T28173] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465b09 [ 571.543381][T28173] RDX: 0000000000020640 RSI: 0000000000000000 RDI: 00000000004af4da [ 571.552069][T28173] RBP: 0000000000000002 R08: 0000000000010320 R09: ffffffffffffffff [ 571.560544][T28173] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 571.569548][T28173] R13: 0000000020000100 R14: 0000000000020640 R15: 0000000020000380 19:30:38 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x27a}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:38 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x4000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:38 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)='\x00'/10, 0xa, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:38 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:30:38 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:38 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETLINK(r4, 0x400454cd, 0x321) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000000c0)={'ip6erspan0\x00', @dev}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 572.273164][T28191] FAULT_INJECTION: forcing a failure. [ 572.273164][T28191] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 572.287870][T28190] loop3: detected capacity change from 259 to 0 [ 572.303468][T28191] CPU: 1 PID: 28191 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 572.312846][T28191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.314358][T28193] loop5: detected capacity change from 264192 to 0 [ 572.325762][T28191] Call Trace: [ 572.325788][T28191] dump_stack+0x137/0x1be [ 572.325829][T28191] should_fail+0x384/0x4b0 [ 572.325854][T28191] _copy_from_user+0x2d/0x170 [ 572.325878][T28191] __se_sys_memfd_create+0x137/0x4b0 [ 572.325903][T28191] do_syscall_64+0x2d/0x70 [ 572.325931][T28191] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 572.325951][T28191] RIP: 0033:0x465b09 [ 572.325972][T28191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 572.325989][T28191] RSP: 002b:00007f2f9b1b9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 572.326011][T28191] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465b09 [ 572.326025][T28191] RDX: 0000000000020640 RSI: 0000000000000000 RDI: 00000000004af4da [ 572.415935][T28191] RBP: 0000000000000002 R08: 0000000000010320 R09: ffffffffffffffff [ 572.423940][T28191] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 572.432276][T28191] R13: 0000000020000100 R14: 0000000000020640 R15: 0000000020000380 [ 572.453862][T28190] BTRFS info (device loop3): has skinny extents 19:30:38 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x6000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:38 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 572.734744][T28226] FAULT_INJECTION: forcing a failure. [ 572.734744][T28226] name failslab, interval 1, probability 0, space 0, times 0 [ 572.748987][T28226] CPU: 1 PID: 28226 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 572.757925][T28226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.768166][T28226] Call Trace: [ 572.772877][T28226] dump_stack+0x137/0x1be [ 572.777259][T28226] should_fail+0x384/0x4b0 [ 572.781751][T28226] ? shmem_alloc_inode+0x16/0x30 [ 572.787009][T28226] should_failslab+0x5/0x20 [ 572.791665][T28226] kmem_cache_alloc+0x62/0x2e0 [ 572.796476][T28226] ? alloc_fd+0x583/0x620 [ 572.800861][T28226] ? shmem_match+0x150/0x150 [ 572.805601][T28226] shmem_alloc_inode+0x16/0x30 [ 572.810517][T28226] new_inode_pseudo+0x61/0x220 [ 572.815443][T28226] new_inode+0x25/0x1d0 [ 572.820204][T28226] shmem_get_inode+0x9d/0x6c0 [ 572.825322][T28226] __shmem_file_setup+0x11e/0x270 [ 572.830800][T28226] __se_sys_memfd_create+0x200/0x4b0 [ 572.836397][T28226] do_syscall_64+0x2d/0x70 [ 572.840950][T28226] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 572.847019][T28226] RIP: 0033:0x465b09 [ 572.852270][T28226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 572.872045][T28226] RSP: 002b:00007f2f9b1b9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 572.880509][T28226] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465b09 [ 572.888698][T28226] RDX: 0000000000020640 RSI: 0000000000000000 RDI: 00000000004af4da [ 572.896828][T28226] RBP: 0000000000000002 R08: 0000000000010320 R09: ffffffffffffffff [ 572.905030][T28226] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 572.913042][T28226] R13: 0000000020000100 R14: 0000000000020640 R15: 0000000020000380 [ 572.988015][T28190] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 19:30:39 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x7000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 573.049709][T28190] BTRFS error (device loop3): failed to read the system array: -5 [ 573.112813][T28238] loop5: detected capacity change from 264192 to 0 19:30:39 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 573.225034][T28190] BTRFS error (device loop3): open_ctree failed 19:30:39 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000", 0xf, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 573.376217][T28246] FAULT_INJECTION: forcing a failure. [ 573.376217][T28246] name failslab, interval 1, probability 0, space 0, times 0 [ 573.400969][T28246] CPU: 0 PID: 28246 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 573.409928][T28246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.420194][T28246] Call Trace: [ 573.423508][T28246] dump_stack+0x137/0x1be [ 573.427887][T28246] should_fail+0x384/0x4b0 [ 573.432355][T28246] ? security_inode_alloc+0x32/0x1d0 [ 573.437963][T28246] should_failslab+0x5/0x20 [ 573.442541][T28246] kmem_cache_alloc+0x62/0x2e0 [ 573.447368][T28246] security_inode_alloc+0x32/0x1d0 [ 573.452621][T28246] inode_init_always+0x3b6/0xa60 [ 573.457599][T28246] ? shmem_match+0x150/0x150 [ 573.462231][T28246] new_inode_pseudo+0x90/0x220 [ 573.467035][T28246] new_inode+0x25/0x1d0 [ 573.471274][T28246] shmem_get_inode+0x9d/0x6c0 [ 573.475994][T28246] __shmem_file_setup+0x11e/0x270 [ 573.481063][T28246] __se_sys_memfd_create+0x200/0x4b0 [ 573.486392][T28246] do_syscall_64+0x2d/0x70 [ 573.490857][T28246] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 573.496788][T28246] RIP: 0033:0x465b09 [ 573.500750][T28246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 19:30:39 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x18000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 573.521006][T28246] RSP: 002b:00007f2f9b1b9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 573.529466][T28246] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465b09 [ 573.537470][T28246] RDX: 0000000000020640 RSI: 0000000000000000 RDI: 00000000004af4da [ 573.545775][T28246] RBP: 0000000000000002 R08: 0000000000010320 R09: ffffffffffffffff [ 573.553998][T28246] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 573.562146][T28246] R13: 0000000020000100 R14: 0000000000020640 R15: 0000000020000380 19:30:39 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2bd}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:39 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 573.818992][T28257] FAULT_INJECTION: forcing a failure. [ 573.818992][T28257] name failslab, interval 1, probability 0, space 0, times 0 [ 573.836124][T28258] loop3: detected capacity change from 259 to 0 [ 573.860845][T28258] BTRFS info (device loop3): has skinny extents [ 573.870953][T28257] CPU: 1 PID: 28257 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 573.879828][T28257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.889939][T28257] Call Trace: [ 573.893249][T28257] dump_stack+0x137/0x1be [ 573.897626][T28257] should_fail+0x384/0x4b0 [ 573.902225][T28257] ? __d_alloc+0x2a/0x6f0 [ 573.906683][T28257] should_failslab+0x5/0x20 [ 573.911244][T28257] kmem_cache_alloc+0x62/0x2e0 [ 573.916085][T28257] __d_alloc+0x2a/0x6f0 [ 573.920266][T28257] ? prandom_u32+0x220/0x260 [ 573.924899][T28257] d_alloc_pseudo+0x19/0x70 [ 573.929439][T28257] alloc_file_pseudo+0xc8/0x240 [ 573.934341][T28257] __shmem_file_setup+0x194/0x270 [ 573.939410][T28257] __se_sys_memfd_create+0x200/0x4b0 [ 573.944770][T28257] do_syscall_64+0x2d/0x70 [ 573.949231][T28257] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 573.955181][T28257] RIP: 0033:0x465b09 [ 573.959161][T28257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 573.978896][T28257] RSP: 002b:00007f2f9b1b9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 573.987347][T28257] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465b09 [ 573.995441][T28257] RDX: 0000000000020640 RSI: 0000000000000000 RDI: 00000000004af4da [ 574.003569][T28257] RBP: 0000000000000002 R08: 0000000000010320 R09: ffffffffffffffff [ 574.011678][T28257] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 574.019719][T28257] R13: 0000000020000100 R14: 0000000000020640 R15: 0000000020000380 [ 574.043073][T28263] loop5: detected capacity change from 264192 to 0 19:30:40 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x1f000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 574.177192][T28258] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 574.214753][T28258] BTRFS error (device loop3): failed to read the system array: -5 19:30:40 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 574.364430][T28289] loop5: detected capacity change from 264192 to 0 [ 574.396338][T28258] BTRFS error (device loop3): open_ctree failed [ 574.515570][T28299] FAULT_INJECTION: forcing a failure. [ 574.515570][T28299] name failslab, interval 1, probability 0, space 0, times 0 [ 574.593745][T28299] CPU: 0 PID: 28299 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 574.602609][T28299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.612803][T28299] Call Trace: [ 574.616120][T28299] dump_stack+0x137/0x1be [ 574.620719][T28299] should_fail+0x384/0x4b0 [ 574.625184][T28299] ? __alloc_file+0x26/0x2f0 [ 574.629810][T28299] should_failslab+0x5/0x20 [ 574.634338][T28299] kmem_cache_alloc+0x62/0x2e0 [ 574.639159][T28299] __alloc_file+0x26/0x2f0 [ 574.643657][T28299] ? alloc_empty_file+0x49/0x1b0 [ 574.648640][T28299] alloc_empty_file+0xa9/0x1b0 [ 574.653442][T28299] alloc_file+0x5d/0x4f0 [ 574.657736][T28299] alloc_file_pseudo+0x1b0/0x240 [ 574.663339][T28299] __shmem_file_setup+0x194/0x270 [ 574.668415][T28299] __se_sys_memfd_create+0x200/0x4b0 [ 574.673764][T28299] do_syscall_64+0x2d/0x70 [ 574.678397][T28299] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 574.684864][T28299] RIP: 0033:0x465b09 [ 574.688790][T28299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 574.708473][T28299] RSP: 002b:00007f2f9b1b9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 574.717129][T28299] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465b09 [ 574.725307][T28299] RDX: 0000000000020640 RSI: 0000000000000000 RDI: 00000000004af4da [ 574.733401][T28299] RBP: 0000000000000002 R08: 0000000000010320 R09: ffffffffffffffff [ 574.741405][T28299] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 574.749621][T28299] R13: 0000000020000100 R14: 0000000000020640 R15: 0000000020000380 19:30:41 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:41 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:41 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000", 0xf, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:41 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x1000000000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:41 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 575.082100][T28314] FAULT_INJECTION: forcing a failure. [ 575.082100][T28314] name failslab, interval 1, probability 0, space 0, times 0 [ 575.095687][T28315] loop3: detected capacity change from 259 to 0 [ 575.119340][T28314] CPU: 0 PID: 28314 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 575.128192][T28314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.139737][T28314] Call Trace: [ 575.143526][T28314] dump_stack+0x137/0x1be [ 575.148282][T28314] should_fail+0x384/0x4b0 [ 575.152750][T28314] ? security_file_alloc+0x32/0x1f0 [ 575.157984][T28314] should_failslab+0x5/0x20 [ 575.162522][T28314] kmem_cache_alloc+0x62/0x2e0 [ 575.167334][T28314] ? rcu_read_lock_sched_held+0x41/0xb0 [ 575.173170][T28314] security_file_alloc+0x32/0x1f0 [ 575.178259][T28314] __alloc_file+0xca/0x2f0 [ 575.182897][T28314] alloc_empty_file+0xa9/0x1b0 [ 575.188194][T28314] alloc_file+0x5d/0x4f0 [ 575.192481][T28314] alloc_file_pseudo+0x1b0/0x240 [ 575.197468][T28314] __shmem_file_setup+0x194/0x270 [ 575.202539][T28314] __se_sys_memfd_create+0x200/0x4b0 [ 575.207870][T28314] do_syscall_64+0x2d/0x70 [ 575.212418][T28314] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 575.218483][T28314] RIP: 0033:0x465b09 [ 575.222722][T28314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 575.242365][T28314] RSP: 002b:00007f2f9b1b9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 575.250817][T28314] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465b09 [ 575.258946][T28314] RDX: 0000000000020640 RSI: 0000000000000000 RDI: 00000000004af4da [ 575.266958][T28314] RBP: 0000000000000002 R08: 0000000000010320 R09: ffffffffffffffff [ 575.274963][T28314] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 575.283006][T28314] R13: 0000000020000100 R14: 0000000000020640 R15: 0000000020000380 [ 575.310594][T28313] loop5: detected capacity change from 264192 to 0 19:30:41 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2f1}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 575.372306][T28315] BTRFS info (device loop3): has skinny extents 19:30:41 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:30:41 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x100000000000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 575.579956][T28350] FAULT_INJECTION: forcing a failure. [ 575.579956][T28350] name failslab, interval 1, probability 0, space 0, times 0 [ 575.635087][T28350] CPU: 0 PID: 28350 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 575.643924][T28350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.654385][T28350] Call Trace: [ 575.657700][T28350] dump_stack+0x137/0x1be [ 575.662302][T28350] should_fail+0x384/0x4b0 [ 575.666761][T28350] ? tomoyo_realpath_from_path+0xd8/0x610 [ 575.673021][T28350] should_failslab+0x5/0x20 [ 575.677565][T28350] __kmalloc+0x84/0x330 [ 575.681766][T28350] ? trace_kfree+0x43/0xd0 [ 575.686319][T28350] ? kfree+0x2f/0x2a0 [ 575.691182][T28350] tomoyo_realpath_from_path+0xd8/0x610 [ 575.696798][T28350] tomoyo_path_perm+0x191/0x570 [ 575.701912][T28350] security_path_truncate+0xc0/0x140 [ 575.707484][T28350] do_sys_ftruncate+0x439/0x680 [ 575.712685][T28350] ? syscall_enter_from_user_mode+0x24/0x190 [ 575.718715][T28350] ? lockdep_hardirqs_on+0x8d/0x130 [ 575.724067][T28350] do_syscall_64+0x2d/0x70 [ 575.728532][T28350] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 575.734459][T28350] RIP: 0033:0x465ac7 [ 575.738392][T28350] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 575.758121][T28350] RSP: 002b:00007f2f9b1b9f48 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 575.766667][T28350] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465ac7 [ 575.774872][T28350] RDX: 0000000000020640 RSI: 0000000000020640 RDI: 0000000000000004 [ 575.783064][T28350] RBP: 0000000000000002 R08: 0000000000010320 R09: ffffffffffffffff [ 575.791226][T28350] R10: 0000000000000002 R11: 0000000000000217 R12: 0000000000000004 [ 575.799336][T28350] R13: 0000000000000004 R14: 0000000000020640 R15: 0000000020000380 [ 575.811251][T28350] ERROR: Out of memory at tomoyo_realpath_from_path. [ 575.865775][T28315] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 575.890414][T28350] loop1: detected capacity change from 259 to 0 [ 575.896441][T28315] BTRFS error (device loop3): failed to read the system array: -5 [ 575.949650][T28350] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (28350) [ 576.035513][T28315] BTRFS error (device loop3): open_ctree failed 19:30:42 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:30:42 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2f2}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:42 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000", 0xf, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 576.456484][T28373] FAULT_INJECTION: forcing a failure. [ 576.456484][T28373] name failslab, interval 1, probability 0, space 0, times 0 [ 576.512942][T28376] loop5: detected capacity change from 264192 to 0 [ 576.534868][T28373] CPU: 1 PID: 28373 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 576.543700][T28373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.554560][T28373] Call Trace: [ 576.557878][T28373] dump_stack+0x137/0x1be [ 576.562266][T28373] should_fail+0x384/0x4b0 [ 576.567588][T28373] ? tomoyo_encode2+0x25a/0x560 [ 576.572486][T28373] should_failslab+0x5/0x20 [ 576.577144][T28373] __kmalloc+0x84/0x330 [ 576.581351][T28373] ? tomoyo_realpath_from_path+0xd8/0x610 [ 576.587210][T28373] tomoyo_encode2+0x25a/0x560 [ 576.591938][T28373] ? dynamic_dname+0xf0/0xf0 [ 576.596686][T28373] tomoyo_realpath_from_path+0x5c3/0x610 [ 576.602622][T28373] tomoyo_path_perm+0x191/0x570 [ 576.608096][T28373] security_path_truncate+0xc0/0x140 [ 576.613545][T28373] do_sys_ftruncate+0x439/0x680 [ 576.618436][T28373] ? syscall_enter_from_user_mode+0x24/0x190 [ 576.624451][T28373] ? lockdep_hardirqs_on+0x8d/0x130 [ 576.627029][T28381] loop3: detected capacity change from 259 to 0 [ 576.629705][T28373] do_syscall_64+0x2d/0x70 [ 576.629777][T28373] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 576.629800][T28373] RIP: 0033:0x465ac7 [ 576.629820][T28373] Code: 48 89 e7 e8 cb e5 ff ff 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 1a 00 00 90 b8 4d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 [ 576.629838][T28373] RSP: 002b:00007f2f9b1b9f48 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 576.629861][T28373] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465ac7 [ 576.629876][T28373] RDX: 0000000000020640 RSI: 0000000000020640 RDI: 0000000000000004 [ 576.629889][T28373] RBP: 0000000000000002 R08: 0000000000010320 R09: ffffffffffffffff [ 576.704167][T28373] R10: 0000000000000002 R11: 0000000000000217 R12: 0000000000000004 19:30:42 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:43 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 576.712172][T28373] R13: 0000000000000004 R14: 0000000000020640 R15: 0000000020000380 [ 576.730037][T28373] ERROR: Out of memory at tomoyo_realpath_from_path. [ 576.768508][T28373] loop1: detected capacity change from 259 to 0 [ 576.776232][T28381] BTRFS info (device loop3): has skinny extents [ 576.787090][T28373] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (28373) 19:30:43 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x200000000000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:43 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 577.102274][T28422] loop5: detected capacity change from 264192 to 0 [ 577.102315][T28381] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 577.118513][T28381] BTRFS error (device loop3): failed to read the system array: -5 [ 577.121480][T28423] FAULT_INJECTION: forcing a failure. [ 577.121480][T28423] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 577.170608][T28381] BTRFS error (device loop3): open_ctree failed [ 577.261622][T28423] CPU: 0 PID: 28423 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 577.270464][T28423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.280551][T28423] Call Trace: [ 577.283951][T28423] dump_stack+0x137/0x1be [ 577.288333][T28423] should_fail+0x384/0x4b0 [ 577.292813][T28423] prepare_alloc_pages+0x1c5/0x5b0 [ 577.297982][T28423] __alloc_pages_nodemask+0xb6/0x500 [ 577.303322][T28423] alloc_pages_vma+0x53f/0xde0 [ 577.308217][T28423] ? mpol_shared_policy_lookup+0x15e/0x200 [ 577.314065][T28423] shmem_alloc_and_acct_page+0x40e/0xbd0 [ 577.319789][T28423] shmem_getpage_gfp+0x849/0x2d80 [ 577.324894][T28423] shmem_write_begin+0xcd/0x1a0 [ 577.329786][T28423] generic_perform_write+0x240/0x4f0 [ 577.335269][T28423] __generic_file_write_iter+0x222/0x4e0 [ 577.340982][T28423] generic_file_write_iter+0xa7/0x1b0 [ 577.346430][T28423] vfs_write+0x896/0xab0 [ 577.350734][T28423] __x64_sys_pwrite64+0x151/0x1c0 [ 577.355982][T28423] do_syscall_64+0x2d/0x70 [ 577.360577][T28423] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 577.366527][T28423] RIP: 0033:0x4191a7 [ 577.370463][T28423] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 577.390191][T28423] RSP: 002b:00007f2f9b1b9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 577.398854][T28423] RAX: ffffffffffffffda RBX: 00000000004bf858 RCX: 00000000004191a7 19:30:43 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2ff}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:43 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x400000000000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 577.407575][T28423] RDX: 000000000000012b RSI: 0000000020010000 RDI: 0000000000000004 [ 577.415623][T28423] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 577.423638][T28423] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 577.431652][T28423] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 19:30:43 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000000000", 0x12, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 577.610442][T28423] loop1: detected capacity change from 259 to 0 19:30:44 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:30:44 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 577.820138][T28441] loop3: detected capacity change from 259 to 0 [ 577.903036][T28449] FAULT_INJECTION: forcing a failure. [ 577.903036][T28449] name failslab, interval 1, probability 0, space 0, times 0 [ 577.917770][T28449] CPU: 1 PID: 28449 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 577.927713][T28449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.938210][T28449] Call Trace: [ 577.941511][T28449] dump_stack+0x137/0x1be [ 577.945917][T28449] should_fail+0x384/0x4b0 [ 577.950374][T28449] ? xas_create+0x1279/0x1c00 [ 577.955361][T28449] should_failslab+0x5/0x20 [ 577.960593][T28449] kmem_cache_alloc+0x62/0x2e0 [ 577.965410][T28449] xas_create+0x1279/0x1c00 [ 577.970438][T28449] xas_create_range+0x167/0x770 [ 577.975357][T28449] shmem_add_to_page_cache+0xba2/0x14c0 [ 577.981140][T28449] shmem_getpage_gfp+0xba5/0x2d80 [ 577.986238][T28449] shmem_write_begin+0xcd/0x1a0 [ 577.991216][T28449] generic_perform_write+0x240/0x4f0 [ 577.996819][T28449] __generic_file_write_iter+0x222/0x4e0 [ 578.003285][T28449] generic_file_write_iter+0xa7/0x1b0 [ 578.008818][T28449] vfs_write+0x896/0xab0 [ 578.013222][T28449] __x64_sys_pwrite64+0x151/0x1c0 [ 578.018288][T28449] do_syscall_64+0x2d/0x70 [ 578.023036][T28449] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 578.029489][T28449] RIP: 0033:0x4191a7 [ 578.033753][T28449] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 578.056829][T28449] RSP: 002b:00007f2f9b1b9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 578.067650][T28449] RAX: ffffffffffffffda RBX: 00000000004bf858 RCX: 00000000004191a7 [ 578.076624][T28449] RDX: 000000000000012b RSI: 0000000020010000 RDI: 0000000000000004 [ 578.085160][T28449] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 578.093361][T28449] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 19:30:44 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x600000000000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 578.101799][T28449] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 578.130202][T28449] loop1: detected capacity change from 259 to 0 [ 578.201223][T28449] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (28449) [ 578.250433][T28457] loop5: detected capacity change from 264192 to 0 [ 578.273033][T28441] BTRFS info (device loop3): has skinny extents 19:30:44 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:30:44 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x700000000000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 578.432970][T28441] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 578.443636][T28441] BTRFS error (device loop3): failed to read the system array: -5 [ 578.485050][T28441] BTRFS error (device loop3): open_ctree failed [ 578.797696][T28486] FAULT_INJECTION: forcing a failure. [ 578.797696][T28486] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 578.811730][T28486] CPU: 0 PID: 28486 Comm: syz-executor.1 Not tainted 5.11.0-rc6-syzkaller #0 [ 578.820529][T28486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.830711][T28486] Call Trace: [ 578.834020][T28486] dump_stack+0x137/0x1be [ 578.838433][T28486] should_fail+0x384/0x4b0 [ 578.842892][T28486] iov_iter_copy_from_user_atomic+0x3d6/0xdd0 [ 578.849090][T28486] ? shmem_write_begin+0xcd/0x1a0 [ 578.854174][T28486] generic_perform_write+0x2c2/0x4f0 [ 578.859623][T28486] __generic_file_write_iter+0x222/0x4e0 [ 578.865680][T28486] generic_file_write_iter+0xa7/0x1b0 [ 578.871721][T28486] vfs_write+0x896/0xab0 [ 578.876059][T28486] __x64_sys_pwrite64+0x151/0x1c0 [ 578.881127][T28486] do_syscall_64+0x2d/0x70 [ 578.885573][T28486] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 578.891602][T28486] RIP: 0033:0x4191a7 [ 578.895893][T28486] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 578.916066][T28486] RSP: 002b:00007f2f9b1b9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 578.924608][T28486] RAX: ffffffffffffffda RBX: 00000000004bf858 RCX: 00000000004191a7 [ 578.932714][T28486] RDX: 000000000000012b RSI: 0000000020010000 RDI: 0000000000000004 [ 578.941603][T28486] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 578.949793][T28486] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 578.957969][T28486] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 579.008950][T28487] loop5: detected capacity change from 264192 to 0 [ 579.063951][T28486] loop1: detected capacity change from 259 to 0 [ 579.298829][T28486] BTRFS info (device loop1): has skinny extents 19:30:45 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:45 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x1, 0x0, 0x5, 0x0, 0x0, 0x5, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x1000000000008, 0x0, 0x8}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:45 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000000000", 0x12, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:45 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x306}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:45 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x1800000000000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 579.459162][T28486] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 579.508618][T28486] BTRFS error (device loop1): failed to read the system array: -5 [ 579.631465][T28528] loop5: detected capacity change from 264192 to 0 [ 579.693834][T28529] loop3: detected capacity change from 259 to 0 19:30:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 579.768623][T28486] BTRFS error (device loop1): open_ctree failed [ 579.884388][T28529] BTRFS info (device loop3): has skinny extents 19:30:46 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x1f00000000000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 580.042013][T28560] loop1: detected capacity change from 259 to 0 [ 580.109814][T28560] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (28560) 19:30:46 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x32e}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 580.150297][T28529] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 580.179544][T28529] BTRFS error (device loop3): failed to read the system array: -5 [ 580.518872][T28577] loop5: detected capacity change from 264192 to 0 19:30:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 580.591822][T28529] BTRFS error (device loop3): open_ctree failed 19:30:47 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="000000000000000000000000010000000000", 0x12, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:47 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000010200)=ANY=[]) pipe(&(0x7f0000000040)) openat(r0, &(0x7f0000000340)='./file0\x00', 0x4000c0, 0x0) uselib(&(0x7f0000000080)='./file2\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 580.794051][T28590] loop1: detected capacity change from 259 to 0 [ 580.840963][T28597] loop3: detected capacity change from 259 to 0 [ 581.076188][T28597] BTRFS warning: duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (28597) [ 581.093536][T28590] BTRFS info (device loop1): has skinny extents 19:30:47 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:47 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x359}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 581.259973][T28623] loop5: detected capacity change from 264192 to 0 [ 581.272156][T28623] Can't find a SQUASHFS superblock on loop5 [ 581.282205][T28590] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 581.364018][T28590] BTRFS error (device loop1): failed to read the system array: -5 19:30:47 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:47 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000", 0x13, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:47 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname$packet(r0, &(0x7f0000000140), &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@delnexthop={0x68, 0x69, 0x10, 0x70bd25, 0x25dfdbfe, {}, [{0x8}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x40400c0}, 0x20004801) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x4) openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 581.537324][T28590] BTRFS error (device loop1): open_ctree failed [ 581.653840][T28649] loop3: detected capacity change from 259 to 0 [ 581.719474][T28650] loop5: detected capacity change from 264192 to 0 [ 581.743575][T28649] BTRFS info (device loop3): has skinny extents 19:30:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 581.940104][T28680] loop1: detected capacity change from 259 to 0 [ 581.963555][T28649] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 19:30:48 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x35d}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 581.986208][T28649] BTRFS error (device loop3): failed to read the system array: -5 [ 582.020839][T28680] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (28680) [ 582.197972][T28649] BTRFS error (device loop3): open_ctree failed [ 582.205925][T28680] loop1: detected capacity change from 259 to 0 [ 582.279562][T28680] BTRFS info (device loop1): has skinny extents 19:30:48 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000", 0x13, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 582.502305][T28680] BTRFS error (device loop1): open_ctree failed 19:30:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:30:48 executing program 5: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000440), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40000, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) fcntl$dupfd(r0, 0x0, r1) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r2, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r3 = syz_mount_image$squashfs(&(0x7f0000000140)='squashfs\x00', &(0x7f0000000180)='./file0\x00', 0x3ff, 0x2, &(0x7f0000000380)=[{&(0x7f00000001c0)="529bea9772855ddb3b2cb8f13c82029b639b3e8ecd", 0x15, 0x7f}, {&(0x7f0000000240)="ed91eef26ebe24e16ef608c1b0a832ffcfa474e11494dace9c9efc152abcede1923bcec296748ec63f9a4120220b900bc7facdadffef1b718667645f493434797ca546c01ad815f824c83311023ffbe016ff677e3bb9f584f4e76d06f7491e93ccbae061dd17dd0456727bd880ac2df0fddaef85d4a8a44d8ae721f20d6951dbd6381834a7f1368196b754d3a87c4b06d458545c616d0504dcd2202400069bfa574443d0b3643c02a6d0a4ffe398e5356943840c8db5e6bc80dc83e3493a74fa0e220e0f8f2f88341feada2d6bf150c66f47897dce0ddf8316347fc6950721662dd5df0747", 0xe5, 0x8000}], 0x850000, &(0x7f00000003c0)={[{')]%'}, {}], [{@dont_appraise='dont_appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type='appraise_type=imasig'}]}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000400)=0x40000) 19:30:48 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:48 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 582.628705][T28722] loop3: detected capacity change from 259 to 0 [ 582.770486][T28722] BTRFS info (device loop3): has skinny extents [ 582.852511][T28744] loop1: detected capacity change from 259 to 0 [ 582.892506][T28748] loop5: detected capacity change from 264192 to 0 19:30:49 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x388}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 582.902625][T28744] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (28744) [ 583.036768][T28744] loop1: detected capacity change from 259 to 0 19:30:49 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000180)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="7f283df6e9eebb3611c45b8f03943665b73c2b35a6f554de8b7da02f22ed60afab1de259bfaf7f758ffd3e78c0c2b00abc48b83c66df6fd4e3720c69c06451817dc0d4142519173fc4dea3c0a207afc61cdb8e1b12984cbd50c1abd8fc8a3d70abbe00"/108, 0x6c, 0xfffffffffffffff7}], 0x292429, &(0x7f0000000140)=ANY=[@ANYRES16=r0]) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 583.108132][T28744] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (28744) [ 583.122931][T28722] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 583.166209][T28722] BTRFS error (device loop3): failed to read the system array: -5 [ 583.258257][T28722] BTRFS error (device loop3): open_ctree failed 19:30:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:30:49 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000", 0x13, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 583.492138][T28777] loop1: detected capacity change from 259 to 0 19:30:49 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:49 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39a}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 583.600303][T28777] BTRFS info (device loop1): has skinny extents [ 583.707163][T28789] loop3: detected capacity change from 259 to 0 [ 583.754681][T28777] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 583.757990][T28789] BTRFS warning: duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (28789) [ 583.775372][T28777] BTRFS error (device loop1): failed to read the system array: -5 [ 583.788145][T28811] loop5: detected capacity change from 16383 to 0 19:30:50 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 584.061880][T28777] BTRFS error (device loop1): open_ctree failed [ 584.078476][T28818] loop5: detected capacity change from 16383 to 0 19:30:50 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r1, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x1, 0x9, 0x5, 0x6}, &(0x7f0000000140)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xb1}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) [ 584.211148][T28777] loop1: detected capacity change from 259 to 0 [ 584.232880][T28833] loop3: detected capacity change from 256 to 0 19:30:50 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3a1}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 584.359217][T28840] loop5: detected capacity change from 264192 to 0 19:30:50 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="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", 0x1e6}, {&(0x7f0000000040)="b25ef1afdb38a32507f0aeeeb04ad6ba40b9b960f105c4cc6812b62759a7eada", 0x20, 0x501}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x1c) [ 584.501322][T28833] BTRFS warning: duplicate device /dev/loop3 devid 1 generation 7 scanned by syz-executor.3 (28833) [ 584.520294][T28777] BTRFS info (device loop1): has skinny extents [ 584.663423][T28777] BTRFS error (device loop1): open_ctree failed 19:30:51 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:51 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:30:51 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 585.010045][T28877] loop5: detected capacity change from 264192 to 0 19:30:51 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3be}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 585.107583][T28879] loop3: detected capacity change from 256 to 0 [ 585.168405][T28881] loop1: detected capacity change from 259 to 0 [ 585.261780][T28879] BTRFS info (device loop3): has skinny extents [ 585.269423][T28881] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (28881) 19:30:51 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) read$FUSE(r1, &(0x7f0000000480)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, 0x0, r1}, 0x78) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d00)={{{@in6=@ipv4={[], [], @empty}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000e00)=0xe8) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/nvram\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0x10, &(0x7f0000000f40)={&(0x7f0000000f00)=""/33, 0x21, 0x0}}, 0x10) r6 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r7 = openat(r6, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) read$FUSE(r7, &(0x7f0000000480)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], r3, 0x24, r4, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, r5, r7}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0xa, &(0x7f0000000040)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000100)='GPL\x00', 0x7fffffff, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x10, [], 0x0, 0x1b, r2, 0x8, &(0x7f0000000280)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0x8, 0x5}, 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 585.516697][T28881] loop1: detected capacity change from 259 to 0 19:30:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 585.719826][T28879] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 585.739484][T28879] BTRFS error (device loop3): failed to read the system array: -5 [ 585.764505][T28922] loop5: detected capacity change from 264192 to 0 19:30:52 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 585.988610][T28879] BTRFS error (device loop3): open_ctree failed 19:30:52 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d00)={{{@in6=@ipv4={[], [], @empty}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000e00)=0xe8) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/nvram\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0x10, &(0x7f0000000f40)={&(0x7f0000000f00)=""/33, 0x21, 0x0}}, 0x10) r3 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r4 = openat(r3, &(0x7f0000000340)='./file2\x00', 0x0, 0x30) read$FUSE(r4, &(0x7f0000000480)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x14, 0x1, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8a}], &(0x7f0000000200)='GPL\x00', 0x194, 0x0, 0x0, 0x41100, 0x8, [], r0, 0x24, r1, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x5, 0x80, 0x4}, 0x10, r2, r4}, 0x78) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x9, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x97e, 0x0, 0x0, 0x0, 0x4}, [@alu={0x4, 0x1, 0x7, 0xb, 0x5, 0xc, 0xffffffffffffffef}, @jmp={0x5, 0x1, 0x1, 0x8, 0x4, 0xfffffffffffffff4, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff}]}, &(0x7f0000000100)='GPL\x00', 0xfffff78d, 0x0, 0x0, 0x41000, 0x1e, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x5, 0x0, 0x3}, 0x10}, 0x78) r5 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r5, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:52 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c0}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 586.068514][T28937] loop1: detected capacity change from 259 to 0 [ 586.106413][T28937] BTRFS info (device loop1): has skinny extents 19:30:52 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 586.205625][T28947] loop2: detected capacity change from 264192 to 0 [ 586.268104][T28951] loop5: detected capacity change from 264192 to 0 [ 586.304196][T28968] FAULT_INJECTION: forcing a failure. [ 586.304196][T28968] name failslab, interval 1, probability 0, space 0, times 0 [ 586.378594][T28937] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 586.395429][T28977] loop3: detected capacity change from 256 to 0 [ 586.399520][T28937] BTRFS error (device loop1): failed to read the system array: -5 [ 586.423630][T28968] CPU: 1 PID: 28968 Comm: syz-executor.2 Not tainted 5.11.0-rc6-syzkaller #0 [ 586.432891][T28968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.443877][T28968] Call Trace: [ 586.447573][T28968] dump_stack+0x137/0x1be [ 586.452079][T28968] should_fail+0x384/0x4b0 [ 586.456568][T28968] ? getname_flags+0xba/0x640 [ 586.461339][T28968] should_failslab+0x5/0x20 [ 586.466410][T28968] kmem_cache_alloc+0x62/0x2e0 [ 586.471226][T28968] getname_flags+0xba/0x640 [ 586.475819][T28968] do_sys_openat2+0x5b/0x380 [ 586.480651][T28968] __x64_sys_openat+0x1c8/0x1f0 [ 586.485681][T28968] do_syscall_64+0x2d/0x70 [ 586.490256][T28968] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 586.496385][T28968] RIP: 0033:0x465b09 [ 586.500431][T28968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 586.520332][T28968] RSP: 002b:00007f7dfe20c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 586.528799][T28968] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000465b09 [ 586.536905][T28968] RDX: 0000000000000000 RSI: 0000000020000340 RDI: ffffffffffffffff [ 586.544914][T28968] RBP: 00007f7dfe20c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 586.552932][T28968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 586.561154][T28968] R13: 00007fffa7f32c2f R14: 00007f7dfe20c300 R15: 0000000000022000 19:30:52 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x60000, 0x119180) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000001c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x40, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x45e2}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x1}, @NL80211_MESHCONF_PATH_REFRESH_TIME={0x8}]}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r2, 0x1, 0x70bd29, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x41}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x31}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x15}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x34}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x36}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x0) pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r5 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r5, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:52 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 586.585202][T28937] BTRFS error (device loop1): open_ctree failed 19:30:53 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3e6}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 586.948185][T28977] BTRFS info (device loop3): has skinny extents 19:30:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:30:53 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 587.139956][T29000] loop2: detected capacity change from 264192 to 0 [ 587.200818][T28977] BTRFS error (device loop3): unexpected item type 0 in sys_array at offset 17 [ 587.202196][T29020] FAULT_INJECTION: forcing a failure. [ 587.202196][T29020] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 587.222083][T28977] BTRFS error (device loop3): failed to read the system array: -5 [ 587.265722][T29021] loop1: detected capacity change from 259 to 0 [ 587.302231][T29017] loop5: detected capacity change from 264192 to 0 [ 587.327350][T29021] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (29021) [ 587.394551][T29020] CPU: 1 PID: 29020 Comm: syz-executor.2 Not tainted 5.11.0-rc6-syzkaller #0 [ 587.403400][T29020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.413610][T29020] Call Trace: [ 587.417001][T29020] dump_stack+0x137/0x1be [ 587.421393][T29020] should_fail+0x384/0x4b0 [ 587.425956][T29020] strncpy_from_user+0x32/0x350 [ 587.430870][T29020] getname_flags+0xf0/0x640 [ 587.435403][T29020] do_sys_openat2+0x5b/0x380 [ 587.440058][T29020] __x64_sys_openat+0x1c8/0x1f0 [ 587.445054][T29020] do_syscall_64+0x2d/0x70 [ 587.449512][T29020] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 587.455908][T29020] RIP: 0033:0x465b09 [ 587.459847][T29020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 587.479921][T29020] RSP: 002b:00007f7dfe20c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 587.488376][T29020] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000465b09 [ 587.496393][T29020] RDX: 0000000000000000 RSI: 0000000020000340 RDI: ffffffffffffffff [ 587.504403][T29020] RBP: 00007f7dfe20c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 587.512599][T29020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.520747][T29020] R13: 00007fffa7f32c2f R14: 00007f7dfe20c300 R15: 0000000000022000 19:30:53 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ed}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:54 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 587.758532][T28977] BTRFS error (device loop3): open_ctree failed [ 587.778193][T29021] loop1: detected capacity change from 259 to 0 19:30:54 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 587.958871][T29044] FAULT_INJECTION: forcing a failure. [ 587.958871][T29044] name failslab, interval 1, probability 0, space 0, times 0 [ 587.988102][T29044] CPU: 0 PID: 29044 Comm: syz-executor.2 Not tainted 5.11.0-rc6-syzkaller #0 [ 587.997205][T29044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.007296][T29044] Call Trace: [ 588.010670][T29044] dump_stack+0x137/0x1be [ 588.015053][T29044] should_fail+0x384/0x4b0 [ 588.019588][T29044] ? __alloc_file+0x26/0x2f0 [ 588.024221][T29044] should_failslab+0x5/0x20 [ 588.028764][T29044] kmem_cache_alloc+0x62/0x2e0 [ 588.033581][T29044] __alloc_file+0x26/0x2f0 [ 588.038047][T29044] ? alloc_empty_file+0x49/0x1b0 [ 588.043018][T29044] alloc_empty_file+0xa9/0x1b0 [ 588.047849][T29044] path_openat+0xa8/0x37a0 [ 588.052310][T29044] ? alloc_fd+0x583/0x620 [ 588.056658][T29044] do_filp_open+0x191/0x3a0 [ 588.061297][T29044] ? do_raw_spin_unlock+0x134/0x8a0 [ 588.066539][T29044] ? _raw_spin_unlock+0x24/0x40 [ 588.071401][T29044] ? alloc_fd+0x583/0x620 [ 588.075793][T29044] do_sys_openat2+0xba/0x380 [ 588.080426][T29044] __x64_sys_openat+0x1c8/0x1f0 [ 588.085309][T29044] do_syscall_64+0x2d/0x70 [ 588.089869][T29044] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 588.095796][T29044] RIP: 0033:0x465b09 [ 588.099714][T29044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 588.119531][T29044] RSP: 002b:00007f7dfe20c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 588.127980][T29044] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000465b09 [ 588.136000][T29044] RDX: 0000000000000000 RSI: 0000000020000340 RDI: ffffffffffffffff [ 588.144263][T29044] RBP: 00007f7dfe20c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 588.152380][T29044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 588.160359][T29044] R13: 00007fffa7f32c2f R14: 00007f7dfe20c300 R15: 0000000000022000 [ 588.193954][T29042] loop2: detected capacity change from 264192 to 0 19:30:54 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 588.287125][T29053] loop3: detected capacity change from 259 to 0 19:30:54 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:54 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ee}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:54 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:54 executing program 2 (fault-call:1 fault-nth:3): r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 588.469395][T29058] loop1: detected capacity change from 259 to 0 [ 588.568887][T29068] loop3: detected capacity change from 259 to 0 [ 588.625062][T29062] loop5: detected capacity change from 264192 to 0 [ 588.652138][T29058] BTRFS info (device loop1): has skinny extents 19:30:55 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 588.781130][T29085] loop2: detected capacity change from 264192 to 0 [ 588.807474][T29094] FAULT_INJECTION: forcing a failure. [ 588.807474][T29094] name failslab, interval 1, probability 0, space 0, times 0 19:30:55 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @multicast2}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r2, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 588.941278][T29106] loop3: detected capacity change from 259 to 0 [ 588.954684][T29058] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 588.973542][T29094] CPU: 1 PID: 29094 Comm: syz-executor.2 Not tainted 5.11.0-rc6-syzkaller #0 [ 588.982442][T29094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.992525][T29094] Call Trace: [ 588.995821][T29094] dump_stack+0x137/0x1be [ 589.000166][T29094] should_fail+0x384/0x4b0 [ 589.004642][T29094] ? security_file_alloc+0x32/0x1f0 [ 589.009870][T29094] should_failslab+0x5/0x20 [ 589.015353][T29094] kmem_cache_alloc+0x62/0x2e0 [ 589.020229][T29094] ? rcu_read_lock_sched_held+0x41/0xb0 [ 589.026434][T29094] security_file_alloc+0x32/0x1f0 [ 589.031609][T29094] __alloc_file+0xca/0x2f0 [ 589.036241][T29094] alloc_empty_file+0xa9/0x1b0 [ 589.036996][T29058] BTRFS error (device loop1): failed to read the system array: -5 [ 589.041087][T29094] path_openat+0xa8/0x37a0 [ 589.041152][T29094] ? alloc_fd+0x583/0x620 [ 589.041175][T29094] do_filp_open+0x191/0x3a0 [ 589.041197][T29094] ? do_raw_spin_unlock+0x134/0x8a0 [ 589.041229][T29094] ? _raw_spin_unlock+0x24/0x40 [ 589.041251][T29094] ? alloc_fd+0x583/0x620 [ 589.041291][T29094] do_sys_openat2+0xba/0x380 [ 589.041324][T29094] __x64_sys_openat+0x1c8/0x1f0 [ 589.041356][T29094] do_syscall_64+0x2d/0x70 [ 589.041378][T29094] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 589.099137][T29094] RIP: 0033:0x465b09 [ 589.103155][T29094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 589.124498][T29094] RSP: 002b:00007f7dfe20c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 589.133899][T29094] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000465b09 19:30:55 executing program 2 (fault-call:1 fault-nth:4): r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 589.141987][T29094] RDX: 0000000000000000 RSI: 0000000020000340 RDI: ffffffffffffffff [ 589.150124][T29094] RBP: 00007f7dfe20c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 589.161079][T29094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 589.169264][T29094] R13: 00007fffa7f32c2f R14: 00007f7dfe20c300 R15: 0000000000022000 [ 589.233373][T29116] loop5: detected capacity change from 264192 to 0 19:30:55 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f5}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 589.478037][T29058] BTRFS error (device loop1): open_ctree failed [ 589.581143][T29130] FAULT_INJECTION: forcing a failure. [ 589.581143][T29130] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 589.597746][T29130] CPU: 1 PID: 29130 Comm: syz-executor.2 Not tainted 5.11.0-rc6-syzkaller #0 [ 589.606888][T29130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.617914][T29130] Call Trace: [ 589.622000][T29130] dump_stack+0x137/0x1be [ 589.628842][T29130] should_fail+0x384/0x4b0 [ 589.634687][T29130] _copy_to_user+0x2d/0x130 [ 589.639413][T29130] simple_read_from_buffer+0xd9/0x160 [ 589.645797][T29130] proc_fail_nth_read+0x14f/0x1b0 [ 589.650901][T29130] ? rw_verify_area+0x1b8/0x370 [ 589.655800][T29130] ? proc_fault_inject_write+0x2c0/0x2c0 [ 589.661470][T29130] vfs_read+0x213/0xa80 [ 589.665679][T29130] ? mutex_lock_nested+0x1a/0x20 [ 589.671031][T29130] ? __fdget_pos+0x24e/0x2f0 [ 589.675670][T29130] ksys_read+0x11b/0x220 [ 589.679967][T29130] do_syscall_64+0x2d/0x70 [ 589.684419][T29130] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 589.690344][T29130] RIP: 0033:0x418d8c [ 589.694262][T29130] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 589.714341][T29130] RSP: 002b:00007f7dfe22d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 589.722985][T29130] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000418d8c 19:30:56 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file2\x00', 0x80000000001f5, 0x1, &(0x7f0000000040)=[{&(0x7f0000000380)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x1080050, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:56 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 589.730991][T29130] RDX: 000000000000000f RSI: 00007f7dfe22d1e0 RDI: 0000000000000003 [ 589.738989][T29130] RBP: 00007f7dfe22d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 589.746986][T29130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 589.754982][T29130] R13: 00007fffa7f32c2f R14: 00007f7dfe22d300 R15: 0000000000022000 [ 589.940828][T29137] loop5: detected capacity change from 264192 to 0 [ 589.958860][T29136] loop3: detected capacity change from 259 to 0 [ 590.040136][T29145] loop5: detected capacity change from 264192 to 0 19:30:56 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x500}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:56 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:56 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:56 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:30:56 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) r2 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000080)='./file0/file0\x00', 0x80000000001f5, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000540)="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", 0x3b0}, {&(0x7f00000000c0)="82c338e99c43c6210db891019e8c8acde7a222320aa106b70aa170c2e46b6220daad1b4959eb6f7240013c88ef4118afdfe841dc1bc44a41713860492f082d666527239d3d05405e82ef1dcbef8f4c17584ab38d63dd3e3b8282440bfe42f53084e1bd59e5864b108a7112d0a01bf982e49d9a8c33ee0c166bcda561b062c6b7f4da6dcc44025ad018b00e4971b1b231b451cd45bd1e91e8eac8f619eca88c42a637cdf5dbefe461ef9380cb0a05b2690324c9dc86749406b647ae1e95316d6044479054c282fd3edfc984d40cc52f543ce2c0f78b79e458979ba29846f4a980bba6e65a21574b1fa0", 0xe9}], 0x2040000, &(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYBLOB="69a8b8558f5f2452e0caed2882582eb59df4ae6f5010a6f2a2dd559468e3e296fd2ad0eb9db47347fa690723c5523d40659c9a300a543f98323b419ad31de28f9660c45507a0183e7a5a3c32245f0c7319c407cd37f5d6c9b2f9645f01dae4e89de4318d4ca8e3b890446b1623d6abe1e19e34ff7a5aaf", @ANYBLOB="168b880f92bbba5a6e4334b1047f177b4852ae5126ed3b2689d89ee75239b6bea9c2f44347e93b03f7b5afc51b0a2f88ce76e846f4d1d99b7bf351f9636e6bda9814be8f7a6cf1601abdebe722c2a08ef821ec493aaa6f113cb04ab6c87bbf3ca934a78dd77bfc0f35cb83dcda5d891475a2c8635824a55816e762421baaf99ab0017412b92341f5905eaca3732b0325fb806beb222d71a0b354b842b156be009d374b71502197c69520d0ad373a6e69d5e8350a64188b2490eecfe40556f32d0ce231bc9d99631437499319471f9b90453bebeb3caff029e19e06df", @ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESOCT=r1, @ANYRESDEC]) openat(r2, &(0x7f0000000040)='./file2/file0\x00', 0x0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 590.275751][T29163] loop1: detected capacity change from 259 to 0 [ 590.296047][T29157] loop3: detected capacity change from 259 to 0 [ 590.307600][T29162] loop5: detected capacity change from 264192 to 0 [ 590.346243][T29161] loop2: detected capacity change from 264192 to 0 [ 590.486101][T29175] loop5: detected capacity change from 264192 to 0 [ 590.493293][T29163] BTRFS info (device loop1): has skinny extents 19:30:56 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:56 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendto$packet(r1, &(0x7f0000000100)="4d9b2fe503da65ec152b04324b3bd586d4ce8793a1b8bf3cba058b3d6f7f0d7de74566ba8d357ce893f8d83ac56aa6e3e2d8f4ebc596e0170251e107ceab6ec6f6df66d9d40af37fbd3e4032dbcb488284bff7d8d6fc1746c8f25d03640839167b331934c28e3ea09fe99664b06b0922043ccc4f2a289d7b677c7498038eb75b1fd7bc04", 0x84, 0x24000000, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r2, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:57 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 590.685226][T29189] loop5: detected capacity change from 264192 to 0 19:30:57 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x600}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:57 executing program 5: pipe(0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_COALESCE_RX_MAX_FRAMES_LOW={0x8, 0xf, 0x80}, @ETHTOOL_A_COALESCE_PKT_RATE_LOW={0x8, 0xd, 0x8000}, @ETHTOOL_A_COALESCE_RX_USECS_IRQ={0x8, 0x4, 0xe74}, @ETHTOOL_A_COALESCE_PKT_RATE_HIGH={0x8, 0x12, 0xffff}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8, 0x3, 0xfff}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES_LOW={0x8, 0xf, 0x2}, @ETHTOOL_A_COALESCE_USE_ADAPTIVE_RX={0x5, 0xb, 0x1}, @ETHTOOL_A_COALESCE_TX_USECS_HIGH={0x8, 0x15, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(r0, &(0x7f0000000340)='./file2\x00', 0xc442, 0xb0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e22, 0xc37, @mcast1, 0x8}}}, 0x38) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 590.754082][T29163] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 590.778363][T29163] BTRFS error (device loop1): failed to read the system array: -5 [ 590.931007][T29163] BTRFS error (device loop1): open_ctree failed [ 590.956423][T29213] loop3: detected capacity change from 259 to 0 19:30:57 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:57 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x603}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:57 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 591.078334][T29163] loop1: detected capacity change from 259 to 0 [ 591.115061][T29222] loop5: detected capacity change from 264192 to 0 [ 591.160802][T29226] loop2: detected capacity change from 264192 to 0 [ 591.177737][T29163] BTRFS info (device loop1): has skinny extents [ 591.265300][T29245] loop3: detected capacity change from 259 to 0 19:30:57 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x4, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:30:57 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:57 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 591.448688][T29163] BTRFS error (device loop1): open_ctree failed 19:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 591.671153][T29268] loop3: detected capacity change from 259 to 0 19:30:58 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x700}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 591.791657][T29276] loop1: detected capacity change from 259 to 0 [ 591.815652][T29279] Can't find a SQUASHFS superblock on loop5 [ 591.888310][T29269] loop2: detected capacity change from 264192 to 0 19:30:58 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 591.930037][T29276] BTRFS info (device loop1): has skinny extents 19:30:58 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:30:58 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x20) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000280)=0x80, 0x4) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffe5) syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='./file1\x00', 0x5, 0x1, &(0x7f0000000300)=[{&(0x7f0000000100)="1eee1781e59745584bc1691298adc90b374a7d24b5409faa4d8f57615999c3ad1afd2f0a4da8eb4d93df7be1d86763aa626c9c567bc5884d4e7cf6d8944c7dcac0f91ae66eb7dc0bbcc99a0aa93bfd1747e112d55a94f85381cdaea65e309755121726a95785ed36b35f4259e46d3fe847267538ff2e784c11951dde19a6ea4673170c3ee28dba14ccdc8387412c3c818b1994ec6effad3a94ba3a1a6f27737725c17d4411592b510aa89c1a95777a1638f04cacfcc0ff31de7ef58b6c5f95cf944f10f7eafce81d4905fc898a9376be74de", 0xd2, 0x7fffffff}], 0x4, &(0x7f0000000640)={[{'@*#,&&.'}, {'squashfs\x00'}, {'squashfs\x00(\xef\x1b\xa7\x0f\x06\x98\xc6\x816\xb4\xe9A\xae@\x8f\xd2\xb3a\xaa\xcc\xc8\x92W\x1e\x8e\x81a\x0fp:{\x17=]\xf20\xf8\xbasE\xabJ\xa0\xd7\x0fZ\x1e1\x06J\xe1Z\xf6\b\x00\x00\x00\x00\x01\x00\x00\x1a\\P\tW9\xe1\xe6Q\xde#&\r\xd5\xd8\x9f\xb1&8\x9f\xb9\xb5\x8d<\xea\x97\xa2\x80\tz\x92\"\x83\xa2\x85z\x12\xe9\xcb(N\xe4\x01\x81\x1a\xc5\xeb:\xe51\xfe\xc2\xd9\xd3U}\xdax^9\x1e\xc3\x19\xfdI\xa3&\x18\x97\xe4\xe3\xaav9\x1e\x1d*e|47\xd6rQ\x84\xda\xd2\xccl\xdc\xbe\xad\xa1\xc8r2b\xd4\xa6\xec\xb7\x0e\"\x81\x17@\xed;\xb6p<#\xbc)\x99\xa7\xde\xf5`\x97Z\xde\f\xd5\x80>EI\x93\\2ge\x96\xbf\xa0?U\x8c(@b\xbc+dX\'\xe34\x8c\xc6\x8e;.\x92\xc7\xbdlr\x13g[^o\x11\xc7\xe6^'}, {'squashfs\x00'}], [{@obj_type={'obj_type', 0x3d, 'squashfs\x00'}}, {@obj_type={'obj_type', 0x3d, '[\x8d\x01\xbd\xaeS\xb7\x15%6\x9apZ\xc8r\x1a\x9c\xe8\xb4\x93\xd8\xb8\xb8E\t\xef<\x83\xde\xecU\xd9\x1b\x17L\xed\xb9\x987\x02z\xd4e\x88\x97^\xdf\xd8v\n\xfc\xb6\x14\x17\xf6\xba\xe0\xf0L\xc1\xd6\x81\xe2\xacL\xf8\r\xfa6\xa9\x13D\x89;\xe1\v'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@hash='hash'}]}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 592.119538][T29309] loop3: detected capacity change from 259 to 0 19:30:58 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x7, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 592.189841][T29276] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 592.211492][T29276] BTRFS error (device loop1): failed to read the system array: -5 [ 592.384500][T29319] loop5: detected capacity change from 264192 to 0 [ 592.417939][T29276] BTRFS error (device loop1): open_ctree failed 19:30:58 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:30:58 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 592.614353][T29333] loop2: detected capacity change from 264192 to 0 19:30:58 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private0, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x2, r0, 0x1, 0x7, 0x6, @remote}, 0x14) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r1, &(0x7f0000000340)='./file2\x00', 0x20000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:30:59 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1200}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:30:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 592.790671][T29339] loop3: detected capacity change from 259 to 0 [ 592.824613][T29341] loop5: detected capacity change from 264192 to 0 19:30:59 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x18, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 592.835375][T29339] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 0 transid 7 /dev/loop3 scanned by syz-executor.3 (29339) [ 593.001109][T29356] loop1: detected capacity change from 259 to 0 [ 593.054122][T29339] BTRFS error (device loop3): invalid leafsize 0, should be 4096 19:30:59 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000800)={0x2020, 0x0, 0x0, 0x0}, 0x2020) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000002840)=""/86, 0x56}, {&(0x7f00000028c0)=""/4096, 0x1000}], 0x2, 0x400, 0x9) lchown(&(0x7f00000003c0)='./bus/file0\x00', r2, 0xee00) syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='./file1\x00', 0x80, 0x6, &(0x7f0000000680)=[{&(0x7f0000000100)="b742efde6bafac78932ee2dacc14555f2ddf580392778fde4d4e968dea1d", 0x1e, 0x8000000000000000}, {&(0x7f0000000240)="fbe5110a2c42ac4c3addb6e5614ce46632e57ee19ffa185e241e8f81612700aa17c1727eff59b7c7fe3b6a6218bd431a7ae05ab93b11a5538f8b6c9b3772e039cb86838a2d2d15e7bd4d45f911b6e04e335928453f2994c54dbd09f6724b87ae6a876df55a844be1584d255ddb63fdccddce201bbb517307d807ff86df58069575ea92880d7b2fb955704b010594d70a120894ae81c961f2824b3ea237a96b3631caf62249065210f964633e8877a19c8a4149a9341d0c0187451cc24ac2f4f598d2f99ee200f57f48c5d236f7f06ae7c8c790bfaafd09432e7e353aca7172e93b0c9f2798d8c1", 0xe7, 0xff}, {&(0x7f0000000380)="f2c2268b144232aa14ff6c339d42d5859370a004abc6772ed2f80c35106e1b7ce3eafcbb51c052a5f1156ef633595c110dd9a46767ec9f74a6dd73b79f43b74e56061cff7fbd080a7e1461a1fc88170c8d957c426dcfea5d0cd5945cd7bb51cc8fa5a19bd61ae7ae1ebfc81a5e9a4e3f2d0ccf3342f63dacbc089dfa433322089016d3650255baf4f49cd7603ee66da3ab7fccd4cedde844002e9327c7411432face1176bc9a41bef5840313be710702096d6704c048afc0d9dba212d99bbcb8c240d49c4a0551c959b78da002b59cba2f6812027abbec996deba1d14365242bbcf89190cc1a3ca0e00ee5360f", 0xed, 0x9}, {&(0x7f0000000480)="c264609169d36c3b7fe80a57fcb2df6c5b8b6507a4ac2cfa218076946e161c71cca896fa8f4aba3850614a7d371311504bb36466a22c324ffd2fc3b09acdee0e0d87cc4fc2eaf2a5b2ac5845f30bd8c4859173bd2ce8cd51224ef030e185e8f7cc941267385e6d64347418f659db2b0a2d8a1a5d07c559947b95a24cb2a0afcedd8367218cd4a5296643008125abed6e2e5a5461ca4b89fe2144dd3aca0394d2bfba1db9305fffef1d8100e883063807e6733078cf6dc9cb99a87bdfb87d583fa4d281ff0b3b7d14c99ec03b5c32b3a62d550dfd7de3d2155e6149263f2f352f20", 0xe1, 0x7e94}, {&(0x7f0000000140)="894f84cd54edc3c5a16d7280294afb99164f809f0bfcd492102b0febcae74a3ba7bca7efab2357e3dca775a4e4ea1f3c22f3d52872ad9b5f6b07eab572c31c00d5b7bf508fd8aa1d40ab0c04fb4456e25030b1f3514133ac2b7562294067168b782b8d990b16cafacef824bd17249593519333709c46670972", 0x79, 0x4}, {&(0x7f0000000580)="f20811fd39fe3f2666a5920ba70afaab66fae0d6d0a5b9ec5614fb690297128536af5c018e30285837fbcbd883c2540d5ac913555acdcffb3f3d022842d9923440e702148fc7c49bcd9101fc78358d8e7dff49a5d6d0d13c4d64c9a086ea750a855a182e5a8b80a0bfd355dbae18deed472c66f69c6b01c9051bdd1548806ada3d13953885da8adb46eedf524f71a22df9552453ab3d32c4f3359439c13e7cf56828c53d3a4dbbc916133ece5dd2ea54a90ec068385be430be7fba4f3fa1a3e27cf68f202ec477f516f9a8ed6a0e7e4c69e7ba3a0c7c721808e17d506a207013dae2", 0xe2, 0x8}], 0x40800, &(0x7f0000000740)={[{'squashfs\x00'}, {'+'}], [{@obj_role={'obj_role', 0x3d, 'squashfs\x00'}}, {@appraise='appraise'}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'\xb5{-'}}, {@subj_role={'subj_role', 0x3d, '-'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@appraise='appraise'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@dont_hash='dont_hash'}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r2}}]}) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 593.097394][T29339] BTRFS error (device loop3): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 [ 593.115965][T29362] loop2: detected capacity change from 264192 to 0 [ 593.319551][T29339] BTRFS error (device loop3): invalid stripesize 0 [ 593.348112][T29370] loop5: detected capacity change from 264192 to 0 19:30:59 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x500, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 593.376883][T29339] BTRFS error (device loop3): system chunk array too small 0 < 97 [ 593.453091][T29339] BTRFS error (device loop3): superblock contains fatal errors 19:30:59 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file2\x00', 0x10001, 0x149) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000001380)={0x8d2, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x9, 0x5, &(0x7f0000000100)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @exit, @alu={0x7, 0x0, 0x0, 0x0, 0x3, 0x18, 0xfffffffffffffffc}], &(0x7f0000000140)='GPL\x00', 0xb06, 0x1000, &(0x7f0000000380)=""/4096, 0x41000, 0x0, [], 0x0, 0x1f, r1, 0x8, &(0x7f0000000180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x9, 0x8001, 0x7}, 0x10, 0xffffffffffffffff, r2}, 0x78) [ 593.510583][T29339] BTRFS error (device loop3): open_ctree failed [ 593.526461][T29356] BTRFS error (device loop3): invalid leafsize 0, should be 4096 [ 593.540432][T29356] BTRFS error (device loop3): dev_item UUID does not match metadata fsid: f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 != 00000000-0000-0000-0000-000000000000 [ 593.654888][T29356] BTRFS error (device loop3): invalid stripesize 0 [ 593.697711][T29356] BTRFS error (device loop3): system chunk array too small 0 < 97 19:31:00 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:00 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1a01}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 593.766614][T29356] BTRFS error (device loop3): superblock contains fatal errors [ 593.797326][T29384] loop2: detected capacity change from 264192 to 0 19:31:00 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 593.890907][T29356] BTRFS error (device loop3): open_ctree failed [ 593.969319][T29389] loop5: detected capacity change from 264192 to 0 19:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:00 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x700, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 594.068513][T29405] loop3: detected capacity change from 259 to 0 19:31:00 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:31:00 executing program 5: pipe(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0xffff, 0x2) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x2, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r2, 0x40085112, &(0x7f0000000080)=@x={0x94, 0x0, "ff431cda0122"}) r3 = socket$inet_dccp(0x2, 0x6, 0x0) dup2(r1, r3) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:31:00 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d000000000000006000000000000000100000000000000001000000010", 0x96, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 594.204028][T29413] loop1: detected capacity change from 259 to 0 [ 594.240946][T29413] BTRFS info (device loop1): has skinny extents [ 594.312789][T29424] loop2: detected capacity change from 264192 to 0 [ 594.342218][T29430] loop5: detected capacity change from 264192 to 0 [ 594.390888][T29431] loop3: detected capacity change from 259 to 0 19:31:00 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1800, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:00 executing program 5: pipe(0x0) r0 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/relabel-self\x00', 0x2, 0x0) close(r0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 594.581075][T29413] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 594.608283][T29413] BTRFS error (device loop1): failed to read the system array: -5 19:31:00 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2e03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 594.723697][T29413] BTRFS error (device loop1): open_ctree failed [ 594.765812][T29457] loop5: detected capacity change from 264192 to 0 [ 594.812439][T29431] BTRFS info (device loop1): has skinny extents 19:31:01 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1f00, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 594.909465][T29471] loop2: detected capacity change from 264192 to 0 19:31:01 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 595.097229][T29490] loop2: detected capacity change from 264192 to 0 [ 595.106264][T29431] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 595.175278][T29431] BTRFS error (device loop1): failed to read the system array: -5 [ 595.301301][T29431] BTRFS error (device loop1): open_ctree failed 19:31:01 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x2000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000040)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}, {0x306}, 0x0, {0x2, 0x4e21, @rand_addr=0x64010100}, 'tunl0\x00'}) pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0xfffe, 0x8000}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r4, 0x125d, 0x0) ppoll(&(0x7f0000000100)=[{r2, 0x94}, {r1}, {0xffffffffffffffff, 0x4006}, {r4, 0x8000}, {r0, 0x8040}, {r2, 0x299}, {r3, 0x1080}], 0x7, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={[0x9]}, 0x8) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r5 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) ioctl$SNDCTL_TMR_METRONOME(r2, 0x40045407) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000240)="fc350f77e5c453d902fc45e1e15c3ff94b9505e54ce93c29004d5b7d259cbf67094fd21b275de66d73288f754a6bb68de1b93db0f7b9493548a50fd5556901b92cc23126da85379e259afcc7d499392c77f33044e84e6336bb13d9e9", &(0x7f00000002c0)=@udp6=r7, 0x4}, 0x20) openat(r5, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:31:01 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3601}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:31:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:01 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:31:01 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90", 0x1, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 595.580448][T29516] loop1: detected capacity change from 259 to 0 [ 595.634861][T29522] loop2: detected capacity change from 264192 to 0 [ 595.695796][T29524] loop5: detected capacity change from 264192 to 0 [ 595.705758][T29516] BTRFS info (device loop1): has skinny extents 19:31:02 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 595.886070][T29544] loop3: detected capacity change from 259 to 0 19:31:02 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90", 0x1, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:02 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x4000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 596.045796][T29516] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 596.108286][T29516] BTRFS error (device loop1): failed to read the system array: -5 19:31:02 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4100}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:31:02 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90", 0x1, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 596.262246][T29562] loop3: detected capacity change from 259 to 0 [ 596.293307][T29516] BTRFS error (device loop1): open_ctree failed [ 596.377312][T29569] loop2: detected capacity change from 264192 to 0 [ 596.522746][T29570] loop3: detected capacity change from 259 to 0 19:31:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:03 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x5000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:03 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4101}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:31:03 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r1, 0xf504, 0x0) r2 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r2, &(0x7f0000000140)='./file2\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='./file2\x00', 0x0, 0x0, 0x0, 0x3000, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESOCT=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC, @ANYBLOB="af41af64a68e71115192d1a01cb9832c67726f75706569643d", @ANYRESDEC=0xee01, @ANYBLOB=',blksize=0x0000000000000000,blksize=x0000000000001000,allow_ott_permissions,allow_other,default_permissions,euid<\x00'/124, @ANYRESOCT=r3, @ANYBLOB=',smackfsroot=8,uid=', @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat(r4, &(0x7f0000000100)='./file2\x00', 0x4a400, 0xa) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r5, 0x125d, 0x0) ioctl$NBD_SET_BLKSIZE(r5, 0xab01, 0x49b) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:31:03 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000", 0x4c, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:03 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 596.904952][T29587] loop2: detected capacity change from 264192 to 0 [ 596.948449][T29591] loop1: detected capacity change from 259 to 0 19:31:03 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x7000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 597.017456][T29591] BTRFS info (device loop1): has skinny extents [ 597.019776][T29605] loop3: detected capacity change from 259 to 0 [ 597.153545][T29609] loop5: detected capacity change from 264192 to 0 [ 597.237161][T29591] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 597.271194][T29591] BTRFS error (device loop1): failed to read the system array: -5 19:31:03 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x20000, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80080, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 597.326209][T29634] loop2: detected capacity change from 264192 to 0 19:31:03 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x18000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 597.413590][T29591] BTRFS error (device loop1): open_ctree failed [ 597.432464][T29605] BTRFS info (device loop1): has skinny extents 19:31:03 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5903}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 597.495589][T29605] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 597.506456][T29605] BTRFS error (device loop1): failed to read the system array: -5 [ 597.543525][T29605] BTRFS error (device loop1): open_ctree failed [ 597.765891][T29666] loop1: detected capacity change from 259 to 0 19:31:04 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e4", 0x2, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 597.892640][T29666] BTRFS info (device loop1): has skinny extents [ 597.926049][T29685] loop5: detected capacity change from 264192 to 0 19:31:04 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 598.060147][T29687] loop2: detected capacity change from 264192 to 0 [ 598.095950][T29691] loop3: detected capacity change from 259 to 0 [ 598.151528][T29666] BTRFS error (device loop1): open_ctree failed 19:31:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:04 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1f000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:04 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e4", 0x2, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:04 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x1, 0x6, @broadcast}, 0x14) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 598.385187][T29725] loop3: detected capacity change from 259 to 0 [ 598.411412][T29728] loop1: detected capacity change from 259 to 0 [ 598.432704][T29730] loop2: detected capacity change from 264192 to 0 [ 598.501459][T29728] BTRFS info (device loop1): has skinny extents 19:31:04 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e4", 0x2, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:04 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1000000000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 598.548195][T29740] loop5: detected capacity change from 264192 to 0 19:31:04 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5d03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 598.708482][T29758] loop3: detected capacity change from 259 to 0 [ 598.780189][T29769] loop2: detected capacity change from 264192 to 0 19:31:05 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x1e6, 0x1}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 598.840236][T29728] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 19:31:05 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4f", 0x27, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:05 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x100000000000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 598.910995][T29728] BTRFS error (device loop1): failed to read the system array: -5 [ 598.995967][T29783] loop3: detected capacity change from 259 to 0 [ 599.018091][T29728] BTRFS error (device loop1): open_ctree failed 19:31:05 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4f", 0x27, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:05 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:31:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x12, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:05 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5e02}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 599.369577][T29790] loop3: detected capacity change from 259 to 0 19:31:05 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4f", 0x27, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 599.484133][T29802] loop5: detected capacity change from 264192 to 0 [ 599.546137][T29803] loop2: detected capacity change from 264192 to 0 [ 599.562507][T29810] loop1: detected capacity change from 259 to 0 [ 599.587888][T29802] Can't find a SQUASHFS superblock on loop5 [ 599.677026][T29810] BTRFS info (device loop1): has skinny extents [ 599.695176][T29821] loop3: detected capacity change from 259 to 0 19:31:06 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x200000000000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 599.737418][T29823] loop5: detected capacity change from 264192 to 0 19:31:06 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100", 0x3a, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 599.798080][T29823] Can't find a SQUASHFS superblock on loop5 19:31:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x20b76, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x0, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000100)=r1) pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_io_uring_complete(0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)=@ipmr_newroute={0x28, 0x18, 0x401, 0x0, 0x0, {0x80, 0x20}, [@RTA_METRICS={0x4}, @RTA_PRIORITY={0x8}]}, 0x28}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000080)={0x3, 'veth1_to_bond\x00', {0xffffffff}, 0xc}) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r4 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r4, &(0x7f0000000340)='./file2\x00', 0x240282, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 599.948486][T29810] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 599.960201][T29810] BTRFS error (device loop1): failed to read the system array: -5 [ 600.028195][T29850] loop3: detected capacity change from 259 to 0 19:31:06 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6500}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 600.070157][T29810] BTRFS error (device loop1): open_ctree failed [ 600.341915][T29852] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 600.378397][T29859] loop5: detected capacity change from 264192 to 0 19:31:06 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 19:31:06 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100", 0x3a, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 600.490115][T29877] loop2: detected capacity change from 264192 to 0 19:31:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 600.547718][T29856] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 19:31:07 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x400000000000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 600.691024][T29885] loop3: detected capacity change from 259 to 0 19:31:07 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000040)=[@decrefs], 0xb5, 0x0, &(0x7f0000000100)="022462e0b8102da5a268cda2b3240411125fe58166c3bd3663f89e65f992e9eef32e64e0c030778cfc019292724cbacfa2f6ab7fb27d2662e101d75f439f52f826eb096646506f591bbbab63f93a7216718abcb0ed944552d95ed54dfcd5a1946542e638ec52c3db8f3807a1d7470221fe52f3e6795f9d0c79cb09f791710678a8ea0b7ab89fc6dcbdc85e3f12dde2d5652acda4062a7e9dde07b6d2da2473ad204a28ff36e9b371553953841815ab33051dade94b"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:31:07 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100", 0x3a, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 600.885429][T29897] loop1: detected capacity change from 259 to 0 19:31:07 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6e02}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 600.985325][T29904] loop2: detected capacity change from 264192 to 0 [ 601.020789][T29897] BTRFS info (device loop1): has skinny extents [ 601.091129][T29912] loop3: detected capacity change from 259 to 0 [ 601.132725][T29916] loop5: detected capacity change from 264192 to 0 19:31:07 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x500000000000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:07 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248", 0x43, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:07 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x440940, 0x0) write(r0, &(0x7f0000000100)="51c44d208f34e7dd15fb7c43699e686fb49a16ef4b4c4ad784910ff53350", 0x1e) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = accept$ax25(r0, 0x0, &(0x7f0000000080)) fallocate(r2, 0x48, 0x8, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r3 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000010000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec8400129ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010022000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf9010048413ebdf8b0f977e460fe0929535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312340b5bc09ab108000000000000000000200000024000000ac010000000000000127a08b", 0x1ea}], 0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r1, @ANYRES32=0x0]) r4 = openat(r3, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f0000000180)={0x6, 0x1c, [0x3, 0x6, 0x3, 0x9, 0x0, 0x5fd, 0xffffff0a]}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc0045540, &(0x7f00000001c0)=0xffffff64) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 601.338468][T29897] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 601.367356][T29897] BTRFS error (device loop1): failed to read the system array: -5 19:31:07 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 601.432520][T29945] loop2: detected capacity change from 264192 to 0 [ 601.511078][T29951] loop3: detected capacity change from 259 to 0 [ 601.556533][T29897] BTRFS error (device loop1): open_ctree failed 19:31:07 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x700000000000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:07 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248", 0x43, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 601.674013][T29964] loop1: detected capacity change from 259 to 0 19:31:08 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7602}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 601.790026][T29958] squashfs: Unknown parameter '0x0000000000000003' 19:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x21, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 601.908957][T29971] squashfs: Unknown parameter '0x0000000000000003' [ 601.922801][T29974] loop3: detected capacity change from 259 to 0 19:31:08 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6, 0x9}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x1, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) r2 = dup2(r0, r1) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, r2, 0xa3989000) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file2\x00', 0x0, 0x1) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x111000, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, [@call={0x85, 0x0, 0x0, 0x67}, @call={0x85, 0x0, 0x0, 0x1e}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0x66, &(0x7f0000000140)=""/102, 0x41100, 0x15, [], 0x0, 0x25, r3, 0x8, &(0x7f00000001c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x7, 0x100, 0x7}, 0x10}, 0x78) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r4, 0x125d, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r5, 0x125d, 0x0) write$binfmt_misc(r5, &(0x7f0000000380)={'syz0', "c751282b796e240cfda1885f0796d07f3dbfd072633dd3d73c72877780aca873756ea1e78156384866af1f90361cd93c0687c48e191780287a96b289e13fb3d762ccabd187a9b11a239369fe95c4ecd34259e3605cedc1cfdd87e97253d1a4c4663b286e7cb9"}, 0x6a) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000400)) [ 602.017148][T29977] loop2: detected capacity change from 264192 to 0 [ 602.135092][T29994] loop5: detected capacity change from 264192 to 0 [ 602.202959][T29994] Can't find a SQUASHFS superblock on loop5 19:31:08 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 19:31:08 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1800000000000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:08 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248", 0x43, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 602.256879][T30002] loop1: detected capacity change from 259 to 0 [ 602.334042][T30006] loop5: detected capacity change from 264192 to 0 19:31:08 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7800}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 602.398515][T30006] Can't find a SQUASHFS superblock on loop5 19:31:08 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f00000000c0)='./file2\x00', 0xe0df, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 602.478850][T30013] loop3: detected capacity change from 259 to 0 [ 602.481635][T30002] BTRFS info (device loop1): has skinny extents [ 602.548173][T30026] loop2: detected capacity change from 264192 to 0 19:31:08 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 602.613417][T30038] loop5: detected capacity change from 112 to 0 19:31:09 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x1f00000000000000, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 602.714249][T30048] loop3: detected capacity change from 259 to 0 19:31:09 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000001680)='/dev/null\x00', 0x101000, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000018c0)={0x7, 0x5, 0xc6, &(0x7f00000017c0)="a4e5e98ce73d513bceed57cd517d4f596a14e359581a08795dc6ce669d84eb418ef4ac4c6680e36124650ed77d45ee985ef965da8116a9d07a397c228200294024992341e6bc2f8f2373a6ba0192ecea57b9396cbd046ef377f41e3a8cdda4b943886d58bb6d3d0d7f7ac9e429c4db0dc10bfbedcb4fe92bc002f731f0d7ddff2cef3ed2eede8ddacd1f6516cc6c79d7991e2c048c5263073ae266df3f57c413d07bb9f82c41b0ba93d06f2a620d09d62270ba70c8a006edbc6c965935804e2f3c72ad7ad50a"}) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000001740)={0x4, 0x4}) r3 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000000100)=ANY=[@ANYRES16=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESDEC=r1, @ANYRESDEC=r0, @ANYRES64=r0]) r4 = socket(0x40000000002, 0x3, 0x4) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x2, &(0x7f0000000000)=0x9, 0x2) getsockopt$bt_hci(r4, 0x0, 0x2, 0x0, &(0x7f00000000c0)) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_DISASSOCIATE(r4, &(0x7f0000001700)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000016c0)={&(0x7f0000001780)=ANY=[@ANYBLOB="24e3523546456ad4ee4541", @ANYRES16=r5, @ANYBLOB="020028bd000000000000000700000c009900ef4e00000f00000004005f00"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) openat(r3, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) syz_mount_image$vxfs(&(0x7f0000000080)='vxfs\x00', &(0x7f0000000180)='./file0\x00', 0x80, 0x7, &(0x7f00000015c0)=[{&(0x7f00000001c0), 0x0, 0x1}, {&(0x7f0000000240)="b77be1ea8084e5e928b9f342ff41ed2846991925eadd61412a5e1ab9801e9bd6c70f15925125df73d617fab88e7547a650f1c9c5334f731e73c386db822a8933d93ac3ce84e80ef27647f573f375", 0x4e, 0x9a}, {&(0x7f00000002c0)="1575", 0x2, 0x1}, {&(0x7f0000000380)="126bdf45590ba70d2898734adb91b999c61146bc9f8ad2b358121c4092b7de0cced8bfaacc12e1921b78069e60c25df75c6e514bdee0f9189307740037a8a453fb524b228008f4f0d43d5d78a81748897ba6365608f5f2d67fe730e7071082ee08289975c2e920c2c9475b79a8c7925f48893ac6", 0x74, 0x7fffffff}, {&(0x7f0000000400)="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", 0x1000, 0x5}, {&(0x7f0000001400)="7e135e5a38356f4e5f7180ec1c8f43a9ad4aab76060b314c1d75c7f5438b09fa4298770da59e8a57baf8fbb896d3ab3b78632ec5e5608f08b790595e9ccb8c81a86825793f71a1e48988fc8b4ace523f8c5cf76c44de6769c73fcbfc280f95a17dd35b990464284884787966057283719e20524969f59d511fa35c77a7ec4986447422e6db24b409c3cec1e2d85a119a8f063109e73c7c847e29d00930dabd0527c1397bec1760f568dc3148ff22c19f258224c60bd9f393fdb6c3623cd979a49b08ef5b01dc32ccc741ae4f4b0cf682be5bbee9364aca8146ebedbbc7a786e0dc9ddb8b9f2968bb6f", 0xe9}, {&(0x7f0000001500)="bab8705394f413651108e78333d6e73af497fef642ec4c195e97108e9b20c942a357e58894da2f986bc37b1d785b59b60a614a9159b8646b320c022832b75c9066ab8683f181d43e041e27394ee7018cf7fedd990a7c67df78112e1e1072abe8dce49e50afa3db39eec79db75f4d7995b4e02aa003e24af2881207e7148d99425ff2d02b1d93e78de4828908fc418b7d67", 0x91, 0x6}], 0x2049078, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 602.794285][T30002] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 602.812521][T30002] BTRFS error (device loop1): failed to read the system array: -5 [ 602.861520][T30061] loop2: detected capacity change from 264192 to 0 [ 602.938125][T30002] BTRFS error (device loop1): open_ctree failed [ 602.946753][T30048] BTRFS info (device loop1): has skinny extents 19:31:09 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x2) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:09 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7a02}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 603.064514][T30066] loop5: detected capacity change from 264192 to 0 [ 603.109051][T30066] squashfs: Unknown parameter '' 19:31:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x25, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 603.189126][T30087] loop2: detected capacity change from 264192 to 0 [ 603.201566][T30082] loop5: detected capacity change from 264192 to 0 [ 603.222309][T30048] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 603.243371][T30048] BTRFS error (device loop1): failed to read the system array: -5 19:31:09 executing program 5: pipe(0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x22080, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/vmstat\x00', 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x125d, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001300000828bd6d000900000000000000", @ANYRES32=0x0, @ANYRES32=r2, @ANYRES32, @ANYBLOB="08001f000900000008002c000000010008001c00", @ANYRES32=r1, @ANYBLOB], 0x48}}, 0x840) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r3 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x4, &(0x7f0000010200)=ANY=[]) openat(r3, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 603.553773][T30048] BTRFS error (device loop1): open_ctree failed [ 603.641350][T30109] loop1: detected capacity change from 259 to 0 19:31:09 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 19:31:09 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:10 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 603.685658][T30111] loop5: detected capacity change from 264192 to 0 19:31:10 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7b00}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 603.771408][T30109] BTRFS info (device loop1): has skinny extents 19:31:10 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040)={0x3, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x200000, &(0x7f0000000100)=ANY=[@ANYRES16, @ANYBLOB="9c79c75b93f051fc817c07cad17be7b4bad6b330ad18b83760663d8a00507e8362df143d6cdb1895a915b49354a00d1d41e97887b64477cb347a6d8f57ce788726153738e1fbd40ccd0fc272924b09283ae790dfaa4282cf844aaca45202479e5b6c1ef3b98321bb4046f8dcaf13ba9f09f6286c82b5a1a16d35753f30c4a5eaab87e1492b7c42cf1b0c6191fea98037d91b4f2700bcd24b3a6b19792f136e30cff877ec0f8c8928c4820f47141866f237f3b95f879fc31929b195"]) openat(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$rds(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) fcntl$getown(r1, 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept$phonet_pipe(r3, &(0x7f00000001c0), &(0x7f0000000240)=0x10) [ 603.877654][T30128] loop2: detected capacity change from 264192 to 0 19:31:10 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 604.095432][T30109] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 604.132846][T30109] BTRFS error (device loop1): failed to read the system array: -5 19:31:10 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f424852", 0x44, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:10 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x5) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:10 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 604.358857][T30109] BTRFS error (device loop1): open_ctree failed [ 604.427918][T30109] loop1: detected capacity change from 259 to 0 19:31:11 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8803}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 604.903207][T30109] BTRFS info (device loop1): has skinny extents [ 604.949717][T30161] loop5: detected capacity change from 264192 to 0 [ 604.991911][T30161] squashfs: Unknown parameter 'ÿÿœyÇ[“ðQü|ÊÑ{ç´ºÖ³0­¸7`f' [ 605.133508][T30195] loop3: detected capacity change from 259 to 0 [ 605.144231][T30201] loop2: detected capacity change from 264192 to 0 [ 605.155428][T30109] BTRFS error (device loop1): open_ctree failed 19:31:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x41, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:11 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 19:31:11 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) splice(r0, &(0x7f0000000180)=0x7fffffff, 0xffffffffffffffff, &(0x7f00000001c0)=0x40, 0x9, 0x6) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x288000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file2\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0x3, 0x4}]}, 0xc, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r2) bind$unix(r2, &(0x7f0000000240)=@file={0x0, './file1\x00'}, 0x6e) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:31:11 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:11 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x7) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:11 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010200)=ANY=[]) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)=@ipmr_newroute={0x28, 0x18, 0x401, 0x0, 0x0, {0x80, 0x20}, [@RTA_METRICS={0x4}, @RTA_PRIORITY={0x8}]}, 0x28}}, 0x0) sendmmsg(r1, &(0x7f0000005380)=[{{&(0x7f0000000240)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x400000}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000380)="1b0c69c6c5fa972dc59d166189d4c52831532dc8bb10e202f8cc8340b366f1a32785bfebd8bfc4ac9e3786838feda8bec7b3a6f8311daf279f2ac18503310668283f7a4b2b054e0c7ae8c5c5a15c30711db9e05fff1de8b0dd46b2fb90e9b7172cfbde09317d0375c29e88f37eebb6051b5d307aa65ab60f6f0ba4c647b48dc30940613da6bc3cea35193cb1a2df1fc3c86c", 0x92}], 0x1, &(0x7f0000000440)=[{0xf8, 0x6, 0xd4fa, "5bfbe30880c6dbddf1335405cc796369a14bef4add884b11075cbc1bb81a3ab3a42d96b82116a2502b09f7b25e8713357610d89e964a8906c00f174c7e115b7ebb230313f3c13ae70cd19e0f29e0b59b1e056a6b4995d2ef77400691e6144ac1a7a7931195348b115afd85708142a789bdfca5beccfe9aca8e4ec9b205518cf0c2dfa5b06658dff25642276b9f8c09ad6cf3db0387865be173adfe5744af89862f89ab32972b73f2cfc471ad093f02a95efa96649c26996b4f874a497ca2e0d99c9e1e44f9f43aa6067ec80e142b1dca21af7ab84c6691475399391005ea9b2c4afa0819732432"}, {0x78, 0x1, 0x779, "cee1108c732258404e9143a2996618b8f81436e359d9e408762ac4db8fc8e052d54cc700febdaa7f6dcb0d7999e126ed52cbb419ecb664e5fcbbce4c81aa534894e6d61bebdd096cb157cbc0a168a65605c17a51bf6ccd2a21517c891f8d1b7c91c754d8"}, {0xf8, 0x111, 0x5, "5eb8d4b0748fa6c35f9a97d6233042f4a6e665edf0447b8fceb629947820ba5445ae80f686ab53672a31432b5954caa500299d3fdad12ed1bef73d2f5fa0d4bb197b9b270df7071069bf1ed04eee7b1796d4e113a7747b58bf03c915a8c86f5892c4293a3dfbf5244d727bd0cfa995ad80203dc6777a5a6d706b369aeb09a2e173275784ec15d64041f8d7b890945e68a930b89de5b829be9b5bf67382bac39fdecedeb6a7d52dcf53ca5d0771a3a1b74fc8963fc732734390fc357108cd0d0ccc551574d5bb7eea74b09bcafb871ff398355d5e707a60a14428ef3d1d0bf23de73e7dad22"}, {0x1010, 0x112, 0x9, "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"}], 0x1278}}, {{&(0x7f00000016c0)=@caif, 0x80, &(0x7f0000000300)=[{&(0x7f0000001740)="321f0aeafac820ee9b8ddfe7792cad19d15fbf813bf67e2ec2531593b5d0c2d78b34155460c84495a0361fce022ea09f5ccfdb987b6639744d9dd887ac251c4b7afa9dfc59727e3eb9ed4dcbcd7ddb6916e89ecdc2e6e25fe85788d09ab6f15597c4b0f997d809bd8a7eae6bfdf940585d37fccf1036ecd7e8e00206efb6c05e1801e35874dbbdc9de09ffaa4c37393ec025be6f70cb6f28", 0x98}, {&(0x7f0000001800)="4fcda0f372b1563121f3483d012cfee11845b29356d5e96f7643fb157ffa7b1e18b9893f8ca6b966e859aa9afc9df774f72fa7c6d59de59da1759c0da6033a7fa6df89507e63034d1b0e20fb0b796a1299d07975b7d37798f5afde641386b37f541d3a72d084e5b536f8f2e8afd6b494ab5f372443cb77008f84b5629d318484a8db72efabb0923ab4918a3d3f4127fdd7bc880580dccc81a47ec2c941ed1657bd0ba16427aa82847b56fee056a36ff7d663632e45d666ba29d0a156bfc14cfa1ca641b22ecf3b5679de2e6970db63806354b77e8dcd4b4c0dc01473471fdaa0e3abe4b5be5eaa314bc737c2dbc2e3fa704c3c4384f5e8229ba8fa13d579940085b8535dd82285d1aa2ef993d89e1b437fb717e4e2311dd2c47ed2ff09c31dffc098d207db6745b3c3f9567c2aefeaf7eb532d6b0660c0026b22d2abce4ea764d61bae6280bc7f91e5f2a6d666bb3a2c610509e7fb61e5b97a9a395b160dfee6e2ee9fc4c4a51724c8317f2ec7a7f079fad1469e90d66f8806ccf22bd2213a59f61ca8c7a122380116c57fe1002b8c49aeaf7b1faf80697db34c4a5ad84da85500ebc023bd2408784070242a1ca685279a9dddbe6091aa6c3bb6c88e87f339b1c50ec4fc6064e151b4f1f08ff14da0337449535b838d8ebd91705c5d2cc4f0f63633178e0ac2e3a0acd505aa137e3fa8a3114c84128e3942adb100ab10799a6aa6966987be7f92e47c0d2739ccc2c760cd0393bd73c1c052949010587c3026ebde36a86d7ca6e1176a9c878f8a877288fcb9d82a64136315c4fae62d640af2f1e7a2138b830844197646df9b89d74d51b00e55ec23a57aee02b161cf1b7c7a8afa01f87c98519306acc2d73b8714ef162b9482f59aae158e67c447fe2842c509328410d344493d58e2b067eec9ca9532889ee37d6487bfd977b3d325e53aaa322938fffa82b2cd848bd34856d3435f4225796078f735bcfd271ed537b1d026da45d50fae424646e1652d9f78643c88e511fd3308c8d86471d66a548ec176d1490fe638ff0b16c8434e1bad9c9f54c1c8b2be39976ad643871f6f9f46982ad6fcb44476732e9412b598ab92574e7f7171ce0ac5ae5e2439bcb51d64e7fa19bce3060fb5c28caf183a31c3fa8133dfb0894095b4363ac8f3efd77f0fcfaf64285533e16f97880e44afdcfbbcc1f04805633e23e698806c2be0c1715ab4151ed8d20a036b2d0ea877241dfb443a6d37c0f94112e6dbaeb62458857ec2e1ffa414afaffd9b5d5cdf61d987bd4071ee133ab15c5fef1733054ba87bb55b353c702e6b4d37016339e419a4cc1e8939e01f670c37331ffa5c686c481ec52f5e64d2294131c53e251e0e59852fa64c9cdfa14920ab8b739f84b2cf4dad575971999f957f01b9c5d52a00d97b36554b54b94dc080f88a06e77f74937b8f997686e948a9c1b373e2f7bb734e84f7439abced1d51719a9102d604d9014d6c61391a4b88303780930626134076eeada5ad55349b4d302d5a6a394f1b6caaaa8e21264524d6e6bd5724bef91d68a0c5dc29234dee0dcb6780668225c251f160dda7cc3b8bb3abfaa7aba4171351a7ede9ab2677dc7fa5d59ec1deefcffb0cb52d54c06a94229e2fea7f62828fcd8ef50c0e4c68722d116887280070c0f526d36eeba57ce105225370ea721f771ec1ef5b51e50d8ac2df79a2232509b4d21b552eeda4b65ba9610e30afb84bf06f190bf601b77353e854d6b3bad8d3339dc04976a475dfa4aa7ca4bc5eb8e8c20bb1fd1445223b2ed11e1ee436295ceada502f097a318e6480e9b8f784899a4df91f4fd7ef4ac9498acf3b13ebd92c777175a2cd7b4b8c13f79646a93f451c4bba667b0bda9e56d36d4135b49bcefe78b14c5801346ecc06e45c17665a754f185ebac6582ac07a07ec89a5f6ee8e943da4880f6423c14d23eac110ddf495163878ea9df334f54cacfd81b6bf560ac951cf06c452d0a64034c086b48b604d8d08092ccfafaf87a01b1e6334e421b92a757fa50e04dcbdb191c761f3d81fb00fb56fd1219030dbee814443463a096bde4b57e03349106604e55dcce2e4d031cd81d9ef179a685bdc7655eb74f50b5d6e7048f498cdd7005c87029751721117b8350d257e8ae893891a5507dc94d392bd336a8667594a82936a9a1f552047700d758ea76fb8425b50f571b71cd8f2e1f1069518e57f36531cf28abc9479390ae885fda11cef695aecd634a322ba49c4f8eb9868bdd47d743dec536ffbfa89c6cfd8f3e7a2a456edbb8c87dce61e4edaeae394ee543dde140823c8a0fc88edaa02e2c19ccba92010df9f94845212b4f96e1786e44cd60d807e7ce47d14bde6694a403f7cac72a805418d64ede01ec4b068fab2b3bbf0d5f4ac7702dbba58a21ad693164481372829abbe5d2fe1595a457361a7d0afc85d6b67a12d3feaf1df207e2ff245c9de708742838a326ba4c3c001c88d8e1d6b5bd3f0ff1584d5f3588eed3cff3d00a61a407389996b1f7a7382d8ae5be093693064748e3ca977c607f309dcf559e1b83f570c554913c279455125e091e4d55c5df9b6fa577fe8cc903dd1611fa10ee636a9a70547616f4f520d3d85464718c06549ff9653d95f81733286039d967d03f7b9a30f0b71533223e6b0aa2923f01dd5e4513b763fd46ba7e827e402e3c64487a75d93f204b3e86119227358636947f4ac24d735db2e9258d144297d01f026756353ebbe1932b08ce4e1fb8c977ee0e0740c25e97c543b9413c8c7b5780be5b14ffb9800a7d1a9e736577b1b25a8a5f9754c967f6d0cd5ee717deb4b44c3e4bea9186422e3ff40fba8724d36b7989a84b0bb030a3fbecbf151c80af55c3dccf3fcee0e624968f6ad83046ce10d42dd63cbd13bea8c433f2a823747807d71c3451ee6b8d182e48032e53e61bc29a3f11e443d69222cf893ab12d2fed0a97f3db8396f0be5cc75f32affae1955b76ee6e79231a99d99d380660b424aaac5d10053ee63559d2f6d32133166f18904f0c7858a233d2e61919ba3315c3f5198db337826dac3f39317c64c99efbdfce863fc97a49ae84f877eedf24a9f1f147453d3a1e183587a5896775650bddd913bd66d9bb250a75aba13bb765bbdd5e22f3cd4cd9c019302d09aa2157ff65cb509b6eafab973c438fd2fbf54e9191818e7cfc8b6d914e11bd27fc0ce5d8803d0981bd0643c26fce137a1e5a945e8b1cae229409fc63d20f1ea5d827c5a4b7bbeb04d13c19f73f0ea1da10b1184171ab163456a060f8a2e6acbe69e849ee4df182f46cf2facbf13f8bc74c3a1b01530a78607147961c8c79c8dd0bc54acdb5f8cee14db10a8388490bbc0ce81173bad57565d89265a1cca15bd1346033eb99e2b3e2e0265c77da0fe15f574261d0d5b4b6bbc2f1f92df6d50f1dad6ecc811ed2326f5382c2f203242db5fa8041efb0e5e0bce99a53faae149bed6d0fa30d0e5662c35b81da078d631dad909a9dd535a730f3ecd263ec15b18aeec37a22605e6f8d24c11b91fd877d2d63b428b3d63f9407b4d3d91574d66c9ece591d8765c717c822ec475dab04abd4965d89113860605c0bf9034b828e51514e72dca8b41754949c209b5acec269d4526f295452100f4ca96fe63bd387498bbc688416800334059083fe053a6099b76a0d40f028a3024db1305784710e2f7f7fd706c13fd4be740208cc43465d2065a59c10d1db6d0bccabb07d7ffb69acdf9b26d5186841cba9a33c154f795065759fc3ec93a86391c9d0174204c804f23e396275a647fca85ee5ddb735cfc0299498485e9bec6e296a364ad729b3b06feb8cf89a7b23850c6cdf1b62cd7e8477a1c3f3ddb3c7b7aaa382d89a781f615059e0dec3b10cedd5f63d6c457497bf0bca9498f68fe65577fd306c43794e2cb0aea9c88dc7afa5fe1a377e5e22b409ced47d9d8db779671e5d056d0a5f9322ba253c1bb284ef01842db2d5a43845f839f29d05e88876023a5851e90a5b63feef737e73b718ca1d60aaab490b8d6817071c87a1a725a81191a0f22bf18f535c1dc1b376f3298055ac83fac78429e44f21a98dda7b655c5c82d1180c053025556bc64ddd61b5998748009de7ca74befa1b76f04c3f269a03680ff0439d1df2600d13df781dcad1a9e69636c3021e060790c98a638d8709526508d02d63d3b23988f6905d931c41e53d0ab7e7556ab20cbc2be8651a1e25f8fa62456171148a2fd048d62427c95dba7b9d93a93512521f42bfb133309486c19481c93f55737b6cce2968035577aeb897d740c32f458c625a76a92a1a7d788596ab03d1d248c0d895bc417d309ab5dfc9e1a8974711dd064067c5d6b997ca9632780a8539804e077318c6072848e6e58f6f197d7b07d2e12c5337a7378d486e25257e845e8053d4b5d57595391cfccfe9b49d39899c940f20b41f3c982b89e0b1a87d0e1306a845a0602c6a732f7cb0e11f01a366c3f29f29be356731b3d5a8d3f17084139dfbf875c7ef8462cf29ce08f883ee58c78e8c2767212068366de3e7a7d68e57832c358700908124cd6bc7d677119c70ba20d2af3e92b13f6e794da1d8bb256740d45eec5742cd8d726ff1929d9e5ab0fa74ff95601cb2b7d02cef844ba4e5bdfd17445d8c2236d978813f108a5f7075253395015671c69f41e5d822ce2227ecd2f5fc5de76f43953df274f275c676af50cd487a59b01f31084260735cba331f56733d5021368987b685909c7fe45009d13f59c217b1cc970eae5ed2cfcb6cf6b924939fd62bb57ed73346786c93ccb7128a22b92362f35ca2740b1cff2197991cbf4e345ccfd1c1872d1e0e647e1136690ee2383d6604e2f921b70942f80c0ecac2d202a831ec8ffbc136437f3a8c118bb4f3050d7996aa1ae0bb6f0b24856dac139c5deaee1449e89c0a67d27f5aa84bc24ddf04eb0be68119ee98ee7316cc960f8ca8fd0bf476c8e5c15e3fb085aa164aefd5dca381f41775c7f192e12b78a36a720374e82a8d997a1385bb1eb6f3c3f4b81dd7efafcde2daf637e0b7c354276ecc9ba1b404d2d12712d2dab577829eefb218465c7961cb26fcd737e7478b3970ad91508dd7e88ec2cdfe1705ef456175c5ed1164671e1e781a2255af49c3754dfd733a1b174445c746362382eaa2732b8f0a38f03632f76cd9f18c4e761577eb2fdefa90a38e12724decc58668a966130fa5fa3389698c1d5f9618f9b7a18460820b0e449e5dd9deb11622b07313e1bbef353a5f6979c869f65bb203990c75506ad87a92a2a3a6daca7ffc44ae1201bb44507d27763fd3d94db2e4e08261508162be0b6f5e3b63320b0daa91d9eacf25394aee643da84c61b9c2cec3d423960ec0b7c56106512de58ec0857149f2f73f91e934954060eb7d51bb5c39663a1ff97bb8ae59147d29aaa16d598d287d750a0dfb2e62e3635c2ec8eb9e001cc856fdcc096b13e9fbc1bcc99a7592a8420029161dae0345b8057e4719a2fcc3dc6cb5c3421f584defaf4d88a481d6146ef70a5f53e4f0ba592a1dfa04684b7fcda87f7976797c9564257c5f4fb7f2edc6e2c065799f19d1bbd082f59aa70895cf1ca37330ec73bb3fff2ca9df7a78f398e0ee3299bccadbad0c28b170d18fa73c38854bb550ffce40bd0ee252ff8ebaab9698098e4b7dff5527a1f7b9a193ddcad15fef91105ee8fd5ce1e7b2210626fb6032c9a0240052576d1a3b4e05b690a4bd9137e18ccae4397982a538fd4ad55fe89913ce216c1b1131e94489e50aeef616939d7cc748ef38fcf5e5343ab6e1a20c6dd88093b", 0x1000}], 0x2, &(0x7f0000002800)=[{0x40, 0x10b, 0xaeaa, "9ac592d7d08ac23aa330346d3a8acfd08017199be5c8b910b4bac823c9af5d880ef321903f23869f087d114c3a"}], 0x40}}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002840)="585695c452a4bcdb395f107f9d39b803cf0d4c9dfde1ead5a87cfc2f2ee609b22538736ff8e27478051b60766f2607eae811ca0865e0734e29094954391d9b8094f0f7eb43c68d6ee517cb4c40f2164426ee4f3cc322a57c79f74b58722c5ad86f06e9175943296b677042eef0c11d7659ebd400a3d43ddd105d9d4a9b8751abc8800abe8a7bb6be23dc7e4b26e3c261e206dfe78ca8250acc66230f644bc937fde574c86575ab0436", 0xa9}, {&(0x7f0000002900)="41fb1fbfc5940ce931cf0a15ae", 0xd}, {&(0x7f0000002940)="d88b3123aa8ca24bd1832237f2bd3fff1e5b2d78215ee21ca5b18e3b65c917f44cb260e02e04bdc70473031c3fea919b34e25e6f06a33ddc594028b3e6b613046397c5c8", 0x44}, {&(0x7f00000029c0)="b9e941", 0x3}, {&(0x7f0000002a00)="d7204562c4fcb6c02dee674c2af55dbbeb453eb5d2fba49288ed4e6a8351c7963f2d3aceea01d54ccc929df318e406dae0fc94d2f07eeb5b834196462cabd0824afecd323312730bdd0d5932333633632466d7f2d393f6e56c7207399da99d13e08f15aeb58320cd6b8518f3c76f2fc20062e00aadc94dcf035c5d5c959e75101e25d8fd9b791c48bf2799f7198999e8bfa92c05f6a54e78f01eda5a50307ac5227520f36f1bb85c2dde5f731edf2c9d1acfc50393763e3b60ad4ac5dfe4080fc04598d4ae5a4f9fcd9d04bb88", 0xcd}], 0x5, &(0x7f0000002b80)=[{0x38, 0x88, 0x81, "f08ba2ba7e96c538e44a8a34bdd96b1d02fd94582200524d4700f3b8a4f3eccbbba9628bb32ba1"}, {0xf8, 0x10f, 0x40, "9cd712c43fbb3580efbf34f40334fb108d6c5d73d87a64d2751d4a28f19ab7bf01200efdbbe6049dba1486a352aee008cf893d85a2c5120e2b7e09e09ec33df80a3566f02f3edd6acaa0a160fdee0f709273a40310abd66203310a70e823735219100fbdfbb868a85841da7efa6840744a2377d1061198b25e9a0cc13dd0e3c77e59725ef6981b0d0c40ab6b6085876fb0b30ce91e1c3acc3cc82de2fc00cca971117ae84c4e488bbe464437a29c89469ce009c0862109d02a1060511e03bcf466ac0ae11f255a22d0a98c28807146aa2b50402427e7f50fd70ce945f54dfa5708dd8dfa"}, {0xd8, 0x108, 0x9, "0733ad3e2f414e6c07c687c58e25bbd6d158a335f7042c291611b0bfccc2f5f741faa2dbd730206c3457ded2dbd9a5927061daa460aa26395b93d732e44f9cf5b7f6a992bc42e019560a40f7f1dfe37a62c7bee28ea01c688e4f542e38f322a6d70bcf2a7ac9b52bf59e98b908ed8af24bcb5bd8b259d60b4f69ebf18074f439eb0991464bdea8fd8db474ebdece97de6e1a5446b849c284fcf4359f3053ede9a066127d27a592080c27ea1a9add9e96b8ea94178afebcb1122039afcf667fa59de08a0127299dcf"}, {0x110, 0x29, 0x1ff, "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"}, {0x68, 0x109, 0x81, "a03f87166fbfd0c7250603cc73e047ab8ecb84f62785e97ba098a64fe38d62a309c878bce376be9b62559a72362dd8e34563cf39d2f4664bcfb3b778beba87aa95e6069085583d8b54de95d65387872d56c193448d22caed"}, {0x40, 0x10b, 0xeb09, "c448e3ba5d146d43de134fc5883d086d6c7b9babb93538d7ee7eca59cd374e48ec337691a794d43d599f926ce68022"}, {0x38, 0x110, 0xcb0a, "2d50ba120f26b8428ab739a6529f92e7de7e986471c42fcdb5f86b85b666c6a2a280e6e3"}], 0x3f8}}, {{&(0x7f0000002f80)=@l2tp6={0xa, 0x0, 0x2, @loopback, 0xeb, 0x1}, 0x80, &(0x7f0000005000)=[{&(0x7f0000003000)="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", 0x1000}, {&(0x7f0000004000)="7461a31f73e5d7489ee5b66f3fd0278be0309035df5ae3b443731212546ea1bdfcbf1b4eea41a1542ddda2375b3f66fe0ffdf9011b32bb03689bb2b970f90a22a6f596366432e0a4da74607cae3f6312faba132ddca60461cbfb44b9e056bdb318386af673a7073bec8f1fe9084e48e396b0152f40f527fd984a18b0e18406a202e8005bf0069eebe9cb39e4f1239d361585da17c3421f665afc301108d48813b404ef79c0da6dd8858880f00a43ac9b62cf4216ddef5cf671c3221e44f1d800325cfd198e0344bae9c59cada3c86e72d38e33d7a0234946aa2e570590e3acf37fafd8ee085c9f3f5c569f31d5d11e0bec3acbb596b48f30157f5d835835ace172b520ec52798af299597888502055d608c6831818914af0ed224a3fd3dfa9384782726ee4681dbddee46b61e38ec683ae5818d607d91a0c8d784f7bb8ccb604013fe3df56a0a639d892f1ba4fba2db8f0da11d83f934d5b5fc1ebfbb5f05e19680de1c8c091e20e7ff46815712b1d386d37b66daa0884d5bce86c4ec56937e3c2f844e5b6bf9ef07da3370a005bcff8085471f10403be55a87317c90f51aa7f159e1c1f8707a7adeffb16a9d9128f776c0193ec397e1fee01cffea44d7d974ac8b5d0ad4d9e773a3a84c73bd75a5de711029bcc3e3481529b0c1d7b81f69041d6855225652e5afcb1172b540dc077901ac591ddd66a4b45cb1618f4dfc353b132b78239222f8161492312d2b0946a7a98c87b2786e8b78e96914e8f6aafacc795e58f730eb754f3ee05bfc1654ee89990475fb034c2966a23b23cadae97b5a52e9a1496b3e305250662b187a49f124823d2c826b4ddeafa5c0b54a6520db7a21a93f984be17dcec4116302bccdc7b3f4af943c022a44625829206bd8313e91af88886a0ae4b5cb2b35e1fc78d2c6747e1bcf95f1771c3068b2f5ca8030a7e75ee9f8bd524e5a899ca09f0c6097264a53929cbf8c58c6873a934b5f7ff97c6a7afd7f7069341b90c7d21b807f295612dfbdde511a3759b0f855234a9c0defd60d0125d8cd3dc1f6a1ed5f10e9e1f2ca5c6b09c15678594b4f8e229342896d42c94093f52b84342d0ce4c0722388b5fb58075ce60287e25f2256c4257c388949cd795e2092bcaa2a053323ef157d8228056c9bc309758fefe22450b4fa4114268486936670dd402f2c0c3e4117fcca3a2e0fa50aa4b43141aa463e509bc508085fd43be1aa03ecf8453d493a5c7a7e3c0699dab12160807c90e8b55040a7515c3c1bc6827294061240aeef4ea4c4a969773115f8e7ac858ea2a03dad79443306887c49b5000beab9b997ceaac6231c26e4fff77ca687241075ab505a5b7678cccb21af28c8aa79be868114927231dcf34df6644a10e171675f4e9707e702a7923263fc29bd0416519b2bc5c34058fd606b54104628f9131c8de369e0060499e4244e3d0241c0f3384b00f8b0246b80e402d28f679d0d73144a0cdf154a0cfd5276a51231bfea0b95f76eca719b12170a69e7262203eac1d3eac71adc0e7e81af805a8ef225ef254af164d9918101ba15c2eda460cd1581ace09d8b7c4d4d27ed559633372d9cca55d3db736969e27cb184d796a450357cd6516a163fd54746e79a5f911bac96bfcf5cfce4cbb52f30fa60b206d9ceabfaa85d7469ba38201f0c53287a713717fee5e4cdb8a7e76a68c533b4feb502debb907a6ed233cb91ad4dc01498436e2455e821e8be0d18232a6d6c6f5db1530d0cd1d7b6ecfcd3a0c38c8bc6607f2ed6bcacad414b1fdaad7715bdf1f9fda0d9348f0490f64603f8305c5a540162948382afcd1cefca873c4eed76c10dc95b08583dcb865068b990d60bd17242e89ba8ae4af6659d4e3ea01fdd0045062c6919ab03eb2aa9568f7af8140b9fcfe35fd5e163b139d7f4ce0148ee0a9a2bd56a7f3a74d923f81c2afe44736666d2cfe4f1429e81b11fbef4f3388ff4b27c35cf1ffbecaca7f0efa1f33c4a2ae2f83960fa6f721985493bbd676f4c4426229a812c86a1e3bda1df1cd955b570f41887a70edb26b48bc571b6f25a3d0bf8232f356869992c232e547cff72c8997fa698c8efc6f0ddc3a92eae39cda3d7aad5b9b3fe90e6d0d748fea4797f668922e1d045692f5d70b70591b17d1a4abd91cf481bb4555f4cdafeb4541db40f81f7b6fa099b82fe16d33bbc69202f155c51c0b7f9b893f85b1d674b30fff91a0f25e9c663d4c6eebee028d29a9694140245cc63da1d100d899d6d7440e64242310c7eb3208f6b363fa0fdf9af8ceb53781bd5f8ec72f26f471b29ee0957e56d2c37ac6da66da77575c1e42c87bbd25755e5ce6fdd68159cab50c669bbf255bf3506e43c1fcaa5f34b77198c01c8fda63151150c1422de4a49246157aa4f06ffa6d3184889a6777806cd4f32e0d6ff28a32564e5ad38abbbb4400802ceeeefbfd33f3f40cbffce3d64af9c8836f9b107a03023f6ce35c6185af4038e65e521580368c6825063bdfde3b5a2fe2dd563e018900ca07c40117cc1ea713db1d0797d632812f6600a9a4a2d0582e62ecce2f7c470bcb9d8b53c0d6cf906f74e067dff39e4a53edc4fa0b5e1092a8f6e6b6d65796cd73cd360b69ea5abdcfc736e131fea62b4eb3a86b9bd5ec4ad4811c7fbf0443b0a2f8c650e7fc725e701e1efd935a7798e6a7c7f12bf8c36e5a12a48356c2e39f107660e9b730bd63a9dcd6db7b3d9a8de6a088ba30bf2389f0519cbdf66043b335d45cade811df4dda90709ed0936014474e1f5969f8421292f58e32d1199c2a882c7b42b40ac0ee97a21355a658f75f559d6efd72d6cc3ff0d06076ed4625f650e60b7ec6ad5558f3e7b6333dbfa986984f13db7dfada42fb0e5d531658e260347bed705a1ab8594cfd7739ae4d43117a3bf4766c608976c38301c1d85758657485ec9a3c67d4b59ffe591857c676b1975a99fa609d10617b5310bba459a1f9e592d6d36719d2a07def8edc1f6885b3d2c9602be3755ab3d8e798da8c0b1a9bad0af9fe5f6885d890155c5c78df80b3503cb1f532542f2d2502200f535977821782300777ddce37226a123524482180064dc3ced4a5324a8c5345181b9f9960ca87718993c995facefeb5c1e007272ee63dcb0f10e321bee8d25e25d55251bfa20e7e464edbaae1f22773e50594936205ef06f29a102802b7125f38cb05b5dd5d2b1fc8c728e333daaff5bb693eb568b84d906bb27e1fee190f77919752d0fa48db7cf7800f40efbd9fffcd4d838a66e8cfe265f1c7efab875a6d6ac3e0a4916b4dc5b031b16009a2b171fcbe0c4a4d713482d07086609c380f996a935ac9b61e7bb6fb800fdd4848d9a5263bdbe5091feccdb6b1a27402835b45ccdea86850bb96cb78f8011d6d8ff6ef2fb1bf8c4902aeb39da02fc0b33b7de48bd8c0ea4b50dc8f72cb01e49fa20669ff03f1a3cb6fdc7c3c65886f762d0821e88dba16954e3c592cb92f630112c3347717c2cbe81372f30c5e8014697cea7e75c624b8ca27ac8eb20b824291dd06d0f2804cea37676a00a93e114905f497abcaa8e834a3d965d9be225773d2df8eeeda7565929b7ee5e64f87eab1d384776cec1badf1ea3d14fa797c92cbfa7e89ad4724f76717486734e6f0c322d2e44bd2d0e6e9ae13926311966fb1b6874e9bb013c2bb40f92fda4a3887fef051da03285f43e3039a337cb2497ec6de5484ef43d7293de16205315634f55a52d957a52dbc7e1d3c1a840c5c28d169fcc1fffb94f31a22bae38baf0d37d88177e0f190b7c7860a2401cfef48ef0574e560b194963b524f7181a6e9d6f00fdc6260f2b3c10e59a4eb895d46afe4553728ed65bce54051136ee95fae683ca213e23ce8aa9ec083325e79f20d705375e358a57fd846f65446d70807d9a2c0063bb06893fd16234bf8ce02ba987177870d486b7006cccf13c9693bf19c34ae6354a2002525a60a7a0ec55c22f06e79191de57fd139394df343dbd72708240a5c9d50b3ccddaf839975b70a25c7ae82c19aa414fa5831d7657a4bb4029956aba798b46d99add47b1877999d254ea312616a31cb00cfbe919df84cbbe7c4e865c79eb5f864fb80da29fa37293d8229d74335490f7857727a40098425ea67714eefc015841b6c6558d4beb42631515f3ee9398b1a92628d75d3d157953552bfb97665111e704bff29961c0590fc5ce55700ec25ab3a97d9fdea3fad0a752bfc6087c939ac48ab88c4e9ba6329802a26613dbf817132d8da4f800f7c6127a6ab10823697932263641fb63f9227e4974b6ec2ebda526efdfd1914eec33ddf37d4d6fff683767492ef5a8a2a5eb7774ac9edddc756b5c35a9cbecd45f6d9cf15fdcdf92e86626a50afff72ac0e0383b6ba2f8d9f2f2db99dcf2fcf84ad1f742670ec940ba098aba522d9c09a1e2519db5878031b6a93fb88884ae0ab1217830b9e2afc133db6436dbcda3f8ee389d0e13d64f7929833811243a5d2901180917268199a65082d5b4b275964ee1c1788fcfee1ffa547641fcb80281414b7e3007b8ae63dda8a651dbac1d059d66c8b12e79b3e8055ba960eb3222866777f0bc25390dab152c57d506753581a27593216d253ceca838b39a7dd9ea3e6a39defd98d62ffe3b5a07202e99f6159a4114c507095b08568964928b89fb66e28c03811bb875a4a254bcc05300c57bd007821848e1c2a0d28e3e93359d3416df913bd65e0866b01bf033f60611a1ff02bbee9e63f6872b152d3063ab046044649b415dc2676c16b3d07c22bcfc11a289d8768b7e59df7f9dc76119f787435a329d50fc14e89bbcda61c90b8a2920258a5073508f185b848e2930fef7cbbb01d1a650b91f5ec9a02474665103095dd1a8a9a37473ff52ab43e7a02868c228dd3b0a21eb1dfa8a579b413e111f347999fadb1dd32a48dec516fa68b35db4c5ec9a6925350fa4c62dc354d1e918f8e4c229ea1bd8deb2ad410fb623ed4c3e293619f4c44998820438fe007a6a60c3673619ac9ce4139cc4b396ecf32d58f5f7332b13a469e0f290c169786069427e135d373b8bd95f61287476fd08664de2df6966b0aed4c81efa3f447d42c95bc1dbcfbd12294e78c41c42b823135173ab19b2f6c8ce68f9150eba849e6f56a9fcffd43d87199ac289439ad458f75c029e9d509ecdb669f8bbb9dee7d53eaa38fd2ff6001e04d5a8a3c6682245cdfea55605f474f7fd74b05bf7ee6ce44fd5f9f7c2d5c2b1ee9c14c2579393175ff03e0606461c8a90f5eb82c893554d726a7a866e327f2d5bcfa0957acc1e4480f69993d2744b2c534e8d1ce8aff8e25e9f9f2b58bedac2f63358e5f43f57569ce30d53460dc341e322ff604c53a1829bd8afc1c46827db6d440986920e9d644277226344a87197eca4acb200925c4d4ecec9760b84a9e3d4d2e394ea961d02d94bab65047ad527e7a1026d1c4da0ded20edb736481ef09e20c09f4fba267f807c09335f046099c0fc21498b2479cbf5331eb79b0b4040b9dc562542d6543f920ead09563e25031082553482df5ef91294a5cc80a7d6820d60f4bbb5c8c6d267874476d040f873bf452de1f63d268663bc410575518a06396517b47771d1b9d57fada6a3c2771141fb0f380d90b641f4a1cfc4fb8802e83060f4fcb02665ac66779e1cde0a0cfd01960b83c42552dd7500b1fb9c96cd4ce8cd266e89166d929e1566b5a2d3a652b8c1582228628b3bdb7affc6b24feb776c66722421b904b51baf4aad89f0f6259c67b3e83de3d4fcb8561bb9c0d4f739f7b06ed8b77179cb4f0ac838f62a5fdd", 0x1000}], 0x2, &(0x7f0000005040)=[{0x18, 0x107, 0x2, "73e5"}, {0xf8, 0x14c, 0x101, "de9a2e2526883fa7c19e2a680135ed95c49349fdcac37e2bcdbc7a8757ec8031586dda4626368f3f29b2dec1a57968bcca4e2e7f7672d3c31712e06f59e1e45ea9109bfefc436133cc111b07a7d26ea621c057bb7bf6f3a0a4bd17ecc8f767a01fbab7af3f1e7da3e69be8abed23a371bad645b6b5cbb99a0574de4fcfecaf999ea3b9960906711b3e0ced4a5c2147ea4749afbc6056125ae4e64c2333d2e6ec70e5b28ffeb4e3e3ffffc43b790d7d9b6294013bde5a5f2a14179486ca1e9ead560edbdbc357b190b1e2cbe296700b94ffc71d0b22f059e00587bc6ee0813d63b6009f"}], 0x110}}, {{&(0x7f0000005180)=@can, 0x80, &(0x7f0000005340)=[{&(0x7f0000005200)="1ba7be92a0487d209458a9dfa704813e036b0035fae8f9d6bd0015ce159e3f75d01201ccb5df55", 0x27}, {&(0x7f0000005240)="892edb1cf4b3cd55f7ba886735ea622337756cfac7b5913b2992289a6f00dd87d7ed7b3059d1cc4a2c96d73b4f6c2ea91be107b0012ff9309e852890180830a2659366d11729f15d921fedb58bda3292fee1e577f442ed393ef45f4dc65d4974bcc8eaab6b0022a582cfb3e9d95c814b607087823e438ba27860710b40da80d6b114b2cb33773e178510cead6bfe65cc63e5ea20b23ae84957bd2abb313da457a55b1040bf4bb11b0e52a489a20ba256e82cfc48f57bc6cec413027452", 0xbd}, {&(0x7f0000005300)="bb9dafe462ed1a3531e7dc3d1dbd1e8cefae516f8a954e0b54d1499fb41bff9f516a358e50994944094ace7cc27ce646a79457146bf3", 0x36}], 0x3}}], 0x5, 0x48045) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r2) r5 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$SNDCTL_SYNTH_MEMAVL(r5, 0xc004510e, &(0x7f0000000200)=0x8001) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x1, 0x2, 0xa, 0x1, 0x10, 0xfffffffffffffff0}]}, &(0x7f0000000080)='syzkaller\x00', 0x400, 0x0, 0x0, 0x41100, 0x4, [], 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x4, 0x0, 0x80}, 0x10, 0xffffffffffffffff, r4}, 0x78) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 605.539543][T30219] loop3: detected capacity change from 259 to 0 19:31:11 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9a03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 605.640409][T30226] loop5: detected capacity change from 264192 to 0 [ 605.661529][T30228] loop1: detected capacity change from 259 to 0 [ 605.684509][T30224] loop2: detected capacity change from 264192 to 0 [ 605.740369][T30226] Can't find a SQUASHFS superblock on loop5 [ 605.743329][T30228] BTRFS info (device loop1): has skinny extents 19:31:12 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f4248526653", 0x46, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:12 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x18) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 605.923216][T30256] loop3: detected capacity change from 259 to 0 [ 606.076979][T30228] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 606.098703][T30228] BTRFS error (device loop1): failed to read the system array: -5 19:31:12 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 606.237499][T30268] loop2: detected capacity change from 264192 to 0 [ 606.317606][T30228] BTRFS error (device loop1): open_ctree failed [ 606.406685][T30275] loop5: detected capacity change from 264192 to 0 [ 606.416876][T30275] Can't find a SQUASHFS superblock on loop5 19:31:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 606.543920][T30283] loop3: detected capacity change from 259 to 0 19:31:12 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x500) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:12 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x22e, 0xffffffffffffffff}], 0x42800, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:31:12 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa103}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:31:13 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 606.743723][T30291] loop4: detected capacity change from 259 to 0 [ 606.795946][T30297] loop1: detected capacity change from 259 to 0 [ 606.846363][T30302] loop2: detected capacity change from 264192 to 0 [ 606.895072][T30299] loop5: detected capacity change from 264192 to 0 19:31:13 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbd02}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 607.018923][T30309] loop3: detected capacity change from 259 to 0 [ 607.040355][T30297] BTRFS warning: duplicate device /dev/loop1 devid 1 generation 7 scanned by syz-executor.1 (30297) [ 607.053315][T30291] BTRFS info (device loop4): has skinny extents [ 607.061484][T30299] loop5: detected capacity change from 264192 to 0 19:31:13 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x700) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:13 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = accept4(r0, &(0x7f0000000100)=@qipcrtr, &(0x7f0000000180)=0x80, 0x80000) getsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f00000001c0), &(0x7f0000000240)=0x4) r2 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r2, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) connect$inet(r0, &(0x7f0000000280)={0x2, 0x4e22, @broadcast}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 607.283762][T30291] BTRFS error (device loop4): invalid number of stripes 0 in sys_array at offset 17 [ 607.321662][T30291] BTRFS error (device loop4): failed to read the system array: -5 [ 607.378063][T30342] loop2: detected capacity change from 264192 to 0 [ 607.468257][T30291] BTRFS error (device loop4): open_ctree failed 19:31:13 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) 19:31:13 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbe03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:31:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:14 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x1800) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:14 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000800)={0x2020, 0x0, 0x0, 0x0}, 0x2020) lchown(&(0x7f00000003c0)='./bus/file0\x00', r4, 0xee00) syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='./file1\x00', 0x101, 0x2, &(0x7f0000000180)=[{&(0x7f0000000100)="3a7c3a83d89d69fee39e502e71085e17e5a79e4c0a5a1ddc105abf29dede8992107a32e0c6daeff513f9d3d7d54876fff20dbdf3d59025ca3212193ed6b24fa1ef3cc7103b226f7ce73b24259386a3b6efc00751bd38eeebf2bfa2c2bec9412b0efc27d3ccfabb34524857a18bb1b9bc11a9c4170ae6035ed1063f", 0x7b, 0x400}, {&(0x7f0000000240)="9ed5e27390d3ccb52322601cecb1bb463ea55184c476199f007d1d2f9574480d4e9f8ef54b266a235127d450c570751914793826a246099446e36363790426faf4645cf4efe75698f119d6e4e17cc85f3b3744c5771028ecafbc508871f289cd71b7bfba25ade2df488fa384a2c1df730e74fe2f9d102793bd717f9aba154b2802970340325e5af6adb08ba6d3", 0x8d, 0x101}], 0x4b, &(0x7f0000000400)={[{'/'}, {'squashfs\x00'}, {'squashfs\x00'}, {'squashfs\x00'}, {'squashfs\x00'}, {'squashfs\x00'}, {'squashfs\x00'}, {'squashfs\x00'}, {'!}**#-^'}, {'squashfs\x00'}], [{@uid_lt={'uid<', r2}}, {@hash='hash'}, {@fsname={'fsname'}}, {@euid_eq={'euid', 0x3d, r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) openat(r1, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 607.743311][T30362] loop1: detected capacity change from 259 to 0 19:31:14 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc003}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 607.882911][T30367] loop3: detected capacity change from 259 to 0 [ 607.896308][T30366] loop5: detected capacity change from 264192 to 0 [ 607.941400][T30362] BTRFS info (device loop1): has skinny extents 19:31:14 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 607.994164][T30393] loop4: detected capacity change from 259 to 0 [ 608.011791][T30393] BTRFS warning: duplicate device /dev/loop4 devid 1 generation 7 scanned by syz-executor.4 (30393) [ 608.094197][T30362] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 608.107658][T30400] loop2: detected capacity change from 264192 to 0 [ 608.125920][T30362] BTRFS error (device loop1): failed to read the system array: -5 19:31:14 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200001f4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x242, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="850000020803fcff7500008326223ce35079453e63cfbd94289789ab6d8000000000000000000000e400"/55], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) perf_event_open(&(0x7f0000000840)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000380)='FROZEN\x00', 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) [ 608.282854][T30362] BTRFS error (device loop1): open_ctree failed 19:31:14 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x1f00) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 608.362115][T30410] loop3: detected capacity change from 259 to 0 19:31:14 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @multicast}, 0x10) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x100) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:31:14 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xdc01}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 608.499256][T30362] loop1: detected capacity change from 259 to 0 19:31:14 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 608.591524][T30424] loop2: detected capacity change from 264192 to 0 [ 608.726471][T30431] loop5: detected capacity change from 264192 to 0 19:31:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 608.778667][T30435] loop3: detected capacity change from 259 to 0 19:31:15 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x1000000) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:15 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x2200002, &(0x7f0000000380)=ANY=[]) [ 608.938165][T30447] loop1: detected capacity change from 259 to 0 19:31:15 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x3, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040500001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e74010000000000805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac01000000000000010000", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000080)=0x2, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:31:15 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xdd00}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 609.144008][T30453] loop3: detected capacity change from 259 to 0 [ 609.580560][T30447] BTRFS info (device loop1): has skinny extents 19:31:15 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:16 executing program 4: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000040)=[@decrefs], 0xb5, 0x0, &(0x7f0000000100)="022462e0b8102da5a268cda2b3240411125fe58166c3bd3663f89e65f992e9eef32e64e0c030778cfc019292724cbacfa2f6ab7fb27d2662e101d75f439f52f826eb096646506f591bbbab63f93a7216718abcb0ed944552d95ed54dfcd5a1946542e638ec52c3db8f3807a1d7470221fe52f3e6795f9d0c79cb09f791710678a8ea0b7ab89fc6dcbdc85e3f12dde2d5652acda4062a7e9dde07b6d2da2473ad204a28ff36e9b371553953841815ab33051dade94b"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 609.749875][T30472] loop5: detected capacity change from 264192 to 0 [ 609.789585][T30473] loop2: detected capacity change from 264192 to 0 [ 609.810668][T30447] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 609.826443][T30447] BTRFS error (device loop1): failed to read the system array: -5 [ 609.848099][T30472] Major/Minor mismatch, trying to mount newer 1284.0 filesystem [ 609.874494][T30489] loop3: detected capacity change from 259 to 0 [ 609.952309][T30447] BTRFS error (device loop1): open_ctree failed [ 609.962289][T30489] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 0 transid 0 /dev/loop3 scanned by syz-executor.3 (30489) [ 610.025278][T30472] Please update your kernel [ 610.028401][T30498] loop4: detected capacity change from 264192 to 0 19:31:16 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x2000000) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:16 executing program 4: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000040)=[@decrefs], 0xb5, 0x0, &(0x7f0000000100)="022462e0b8102da5a268cda2b3240411125fe58166c3bd3663f89e65f992e9eef32e64e0c030778cfc019292724cbacfa2f6ab7fb27d2662e101d75f439f52f826eb096646506f591bbbab63f93a7216718abcb0ed944552d95ed54dfcd5a1946542e638ec52c3db8f3807a1d7470221fe52f3e6795f9d0c79cb09f791710678a8ea0b7ab89fc6dcbdc85e3f12dde2d5652acda4062a7e9dde07b6d2da2473ad204a28ff36e9b371553953841815ab33051dade94b"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:31:16 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd2825450078da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac0100000000000001", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) r1 = openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) sendmsg$nl_route(r2, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)=@getaddr={0x14, 0x16, 0x2, 0x70bd25, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40080d0}, 0x0) [ 610.192999][T30489] BTRFS info (device loop1): has skinny extents 19:31:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x60, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 610.268953][T30506] loop2: detected capacity change from 264192 to 0 19:31:16 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe603}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) 19:31:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 610.446673][T30514] Can't find a SQUASHFS superblock on loop5 [ 610.469971][T30525] loop4: detected capacity change from 264192 to 0 19:31:16 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x4000000) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 19:31:17 executing program 5: sendmsg$RDMA_NLDEV_CMD_DELLINK(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x18, 0x1404, 0x10, 0x70bd2a, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x30001010}, 0x40011) pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket(0x2b, 0x5, 0x4) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000000)=0x9, 0x2) getsockopt$bt_hci(r1, 0x0, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, 0x0, 0x2, 0x101, 0x0, 0x0, {0xa, 0x0, 0x9}, [@CTA_EXPECT_HELP_NAME={0xa, 0x6, 'H.245\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0xa8}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x7}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x340f}, @CTA_EXPECT_MASK={0x30, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) ioctl$BLKROSET(r0, 0x125d, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x8008f513, &(0x7f0000000180)) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r2, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:31:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x20b76, &(0x7f0000000080)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x0, 0x2, 0x0, 0x1, @void}}}, @IFLA_NET_NS_PID={0x8, 0x13, r1}]}, 0x3c}}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000100)=r1) pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_io_uring_complete(0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000008c0)=@ipmr_newroute={0x28, 0x18, 0x401, 0x0, 0x0, {0x80, 0x20}, [@RTA_METRICS={0x4}, @RTA_PRIORITY={0x8}]}, 0x28}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000080)={0x3, 'veth1_to_bond\x00', {0xffffffff}, 0xc}) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r4 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r4, &(0x7f0000000340)='./file2\x00', 0x240282, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 19:31:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:17 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:17 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xed03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 610.904794][T30489] BTRFS error (device loop1): open_ctree failed [ 610.928563][T30554] loop5: detected capacity change from 264192 to 0 [ 611.062293][T30565] loop1: detected capacity change from 259 to 0 [ 611.089960][T30552] loop2: detected capacity change from 264192 to 0 [ 611.103947][T30572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 611.127204][T30565] BTRFS info (device loop1): has skinny extents [ 611.170033][T30572] loop4: detected capacity change from 264192 to 0 19:31:17 executing program 5: pipe(0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="6873717307000000911d675f001000000700000001000c00e0000200040000001a01000000000000f501000000000000a401000000000000dd01000000000000810000000000000015010000000000006c01000000000000920100000000000078da2baeacca4eccc9492d2aa61da3980e768c324619a38ca1c64070013443f414920078da636278cbc8c0c0c83051363d1ec840012940cc8424cf8c2627c5c2c0c0ccf01f2e0fe43280cc500362fd92dc02fde2ca2addccdcc4f4d4f4d43c13434b737333634b23fdb4cc9c540308c988643a13d46410ad09c4ec40cc8924cf8a643b179a4b612eaf6381d0c8fad880fc04a8bc8632aa3e905dff81800189469879006e063b540c14022140ff7100690062dd282545ee77da63648000662056006226061686b4cc9c5403070646a0208463c80255c508a5991838c0127ac9f939297540614698b6794006cc0cc36b0cac708e1132c7180038d711c70e0078da4b60800045280d00071800825c010000000000001c0078da636080803a28ad00a51da0f43c287d0d4a4b3142680041df026e740100000000000008805cf90100535f01009a010000000000001d0078da63606063a8482c29293264636080b21860624670312300b5bc09ab108000000000000000000200000024000000ac01000000000000016ec9f30f9c91d5cb8392ca1002cf56bd6579d6bebd22af5204761be5e2736913626d1cc16ba5cb06a0", 0x20f}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 611.224667][T30584] loop3: detected capacity change from 259 to 0 19:31:17 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x5000000) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 611.387053][T30565] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 19:31:17 executing program 4: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:17 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xee00}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 611.429873][T30565] BTRFS error (device loop1): failed to read the system array: -5 [ 611.568966][T30565] BTRFS error (device loop1): open_ctree failed [ 611.574176][T30611] loop2: detected capacity change from 264192 to 0 [ 611.633847][T30610] loop5: detected capacity change from 264192 to 0 [ 611.724140][T30584] BTRFS info (device loop1): has skinny extents [ 611.796210][T30610] ------------[ cut here ]------------ [ 611.838738][T30610] WARNING: CPU: 0 PID: 30610 at mm/page_alloc.c:4979 __alloc_pages_nodemask+0x44e/0x500 [ 611.861970][T30625] loop4: detected capacity change from 259 to 0 [ 611.875484][T30610] Modules linked in: [ 611.892528][T30610] CPU: 0 PID: 30610 Comm: syz-executor.5 Not tainted 5.11.0-rc6-syzkaller #0 [ 611.911535][T30610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 19:31:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) 19:31:18 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x7000000) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 611.941433][T30610] RIP: 0010:__alloc_pages_nodemask+0x44e/0x500 [ 611.955222][T30610] Code: 00 48 ba 00 00 00 00 00 fc ff df e9 fb fd ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 06 fe ff ff e8 97 51 09 00 e9 fc fd ff ff <0f> 0b e9 15 fe ff ff 44 89 ed a9 00 00 08 00 75 11 81 e5 7f ff ff [ 611.989647][T30610] RSP: 0018:ffffc9000264fae8 EFLAGS: 00010246 [ 612.005716][T30610] RAX: ffffc9000264faf0 RBX: ffffc9000264fb1c RCX: 0000000000000000 [ 612.020247][T30610] RDX: 0000000000000028 RSI: 0000000000000000 RDI: ffffc9000264fb18 [ 612.035688][T30610] RBP: 0000000000000000 R08: dffffc0000000000 R09: ffffc9000264faf0 [ 612.072060][T30610] R10: fffff520004c9f63 R11: 0000000000000000 R12: ffffffffffcf25c0 19:31:18 executing program 0: r0 = syz_btf_id_by_name$bpf_lsm(&(0x7f00000001c0)='bpf_lsm_ib_free_security\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xee03}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x78) [ 612.112150][T30584] BTRFS error (device loop1): open_ctree failed [ 612.121959][T30610] R13: 0000000000040cc0 R14: 1ffff920004c9f63 R15: 0000000000000034 [ 612.142022][T30610] FS: 00007f1862a17700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 19:31:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 612.179451][T30610] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 612.202502][T30610] CR2: 0000000000568000 CR3: 000000006d23a000 CR4: 00000000001506f0 [ 612.217249][T30610] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 612.240681][T30625] BTRFS info (device loop1): has skinny extents [ 612.265807][T30610] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 19:31:18 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 612.294870][T30652] loop2: detected capacity change from 264192 to 0 [ 612.309954][T30610] Call Trace: [ 612.358365][T30610] kmalloc_order+0x40/0x130 [ 612.391714][T30610] kmalloc_order_trace+0x15/0x70 19:31:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x108, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 612.417923][T30610] __kmalloc+0x257/0x330 [ 612.444117][T30610] ? squashfs_read_xattr_id_table+0xda/0x210 [ 612.475607][T30674] loop3: detected capacity change from 259 to 0 19:31:18 executing program 2: r0 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000001f5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1e6}], 0x0, &(0x7f0000010200)=ANY=[]) openat(r0, &(0x7f0000000340)='./file2\x00', 0x0, 0x18000000) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) [ 612.485713][T30625] BTRFS error (device loop1): invalid number of stripes 0 in sys_array at offset 17 [ 612.513665][T30610] squashfs_read_table+0x2c/0x3b0 [ 612.529416][T30625] BTRFS error (device loop1): failed to read the system array: -5 [ 612.529461][T30610] ? squashfs_read_xattr_id_table+0x129/0x210 [ 612.548250][T30610] squashfs_fill_super+0xfd6/0x1c60 [ 612.554844][T30610] get_tree_bdev+0x406/0x630 [ 612.599936][T30610] ? squashfs_reconfigure+0xa0/0xa0 [ 612.619354][T30610] vfs_get_tree+0x86/0x270 19:31:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x204, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f00000015c0)="00000000000000000000000001000000000000e4", 0x14, 0x10320}], 0x0, &(0x7f0000000380)=ANY=[]) [ 612.648116][T30625] BTRFS error (device loop1): open_ctree failed [ 612.686588][T30610] path_mount+0x17ad/0x2a00 [ 612.742056][T30686] loop2: detected capacity change from 264192 to 0 [ 612.746203][T30610] __se_sys_mount+0x28c/0x320 [ 612.779396][T30610] do_syscall_64+0x2d/0x70 [ 612.780140][T30674] BTRFS info (device loop1): has skinny extents [ 612.784566][T30610] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 612.800987][T30610] RIP: 0033:0x46702a [ 612.807045][T30610] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 612.834379][T30610] RSP: 002b:00007f1862a16fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 612.847912][T30610] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046702a [ 612.859189][T30610] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f1862a17000 [ 612.872352][T30610] RBP: 00007f1862a17040 R08: 00007f1862a17040 R09: 0000000020000000 [ 612.884739][T30610] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 612.897509][T30610] R13: 00000000200000c0 R14: 00007f1862a17000 R15: 0000000020010200 [ 612.907980][T30610] Kernel panic - not syncing: panic_on_warn set ... [ 612.915125][T30610] CPU: 1 PID: 30610 Comm: syz-executor.5 Not tainted 5.11.0-rc6-syzkaller #0 [ 612.925967][T30610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.940866][T30610] Call Trace: [ 612.945241][T30610] dump_stack+0x137/0x1be [ 612.950243][T30610] ? panic+0x1f3/0x800 [ 612.955453][T30610] panic+0x291/0x800 [ 612.960810][T30610] ? __warn+0x13e/0x270 [ 612.966102][T30610] __warn+0x26a/0x270 [ 612.971698][T30610] ? __alloc_pages_nodemask+0x44e/0x500 [ 612.979466][T30610] ? __alloc_pages_nodemask+0x44e/0x500 [ 612.987664][T30610] report_bug+0x1b1/0x2e0 [ 612.992856][T30610] handle_bug+0x3d/0x70 [ 612.998089][T30610] exc_invalid_op+0x16/0x40 [ 613.004236][T30610] asm_exc_invalid_op+0x12/0x20 [ 613.009780][T30610] RIP: 0010:__alloc_pages_nodemask+0x44e/0x500 [ 613.018540][T30610] Code: 00 48 ba 00 00 00 00 00 fc ff df e9 fb fd ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 06 fe ff ff e8 97 51 09 00 e9 fc fd ff ff <0f> 0b e9 15 fe ff ff 44 89 ed a9 00 00 08 00 75 11 81 e5 7f ff ff [ 613.047736][T30610] RSP: 0018:ffffc9000264fae8 EFLAGS: 00010246 [ 613.057721][T30610] RAX: ffffc9000264faf0 RBX: ffffc9000264fb1c RCX: 0000000000000000 [ 613.067852][T30610] RDX: 0000000000000028 RSI: 0000000000000000 RDI: ffffc9000264fb18 [ 613.077306][T30610] RBP: 0000000000000000 R08: dffffc0000000000 R09: ffffc9000264faf0 [ 613.087087][T30610] R10: fffff520004c9f63 R11: 0000000000000000 R12: ffffffffffcf25c0 [ 613.096678][T30610] R13: 0000000000040cc0 R14: 1ffff920004c9f63 R15: 0000000000000034 [ 613.108046][T30610] ? __alloc_pages_nodemask+0x63/0x500 [ 613.118404][T30610] kmalloc_order+0x40/0x130 [ 613.124905][T30610] kmalloc_order_trace+0x15/0x70 [ 613.132251][T30610] __kmalloc+0x257/0x330 [ 613.137944][T30610] ? squashfs_read_xattr_id_table+0xda/0x210 [ 613.148518][T30610] squashfs_read_table+0x2c/0x3b0 [ 613.157022][T30610] ? squashfs_read_xattr_id_table+0x129/0x210 [ 613.166778][T30610] squashfs_fill_super+0xfd6/0x1c60 [ 613.173118][T30610] get_tree_bdev+0x406/0x630 [ 613.178265][T30610] ? squashfs_reconfigure+0xa0/0xa0 [ 613.184925][T30610] vfs_get_tree+0x86/0x270 [ 613.189593][T30610] path_mount+0x17ad/0x2a00 [ 613.195054][T30610] __se_sys_mount+0x28c/0x320 [ 613.200039][T30610] do_syscall_64+0x2d/0x70 [ 613.204977][T30610] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 613.212665][T30610] RIP: 0033:0x46702a [ 613.217133][T30610] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.240979][T30610] RSP: 002b:00007f1862a16fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 613.250641][T30610] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046702a [ 613.260384][T30610] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f1862a17000 [ 613.268904][T30610] RBP: 00007f1862a17040 R08: 00007f1862a17040 R09: 0000000020000000 [ 613.278741][T30610] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 613.288444][T30610] R13: 00000000200000c0 R14: 00007f1862a17000 R15: 0000000020010200 [ 613.299502][T30610] Kernel Offset: disabled [ 613.305715][T30610] Rebooting in 86400 seconds..