0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 00:30:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) 00:30:44 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:30:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 638.274058] BTRFS error (device loop1): unsupported checksum algorithm 20952 [ 638.313254] BTRFS error (device loop1): superblock checksum mismatch 00:30:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640), 0x0, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 638.405693] BTRFS error (device loop1): open_ctree failed 00:30:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:30:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x4}]}, 0x18}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x1, 0x0, 0x0) 00:30:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) 00:30:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640), 0x0, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:46 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:30:46 executing program 4: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:46 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 640.624273] BTRFS error (device loop1): unsupported checksum algorithm 20952 00:30:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:30:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5", 0x65, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 640.724981] BTRFS error (device loop1): superblock checksum mismatch [ 640.804640] BTRFS error (device loop1): open_ctree failed 00:30:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 640.942152] BTRFS: device fsid ecf6f2a2-2997-48ae-1f08-00d01424f03c devid 0 transid 12498261560847380539 /dev/loop3 00:30:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5", 0x65, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) 00:30:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 641.335033] BTRFS error (device loop3): superblock checksum mismatch [ 641.367116] BTRFS error (device loop3): open_ctree failed [ 641.402915] BTRFS error (device loop3): superblock checksum mismatch 00:30:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 641.520782] BTRFS error (device loop3): open_ctree failed 00:30:50 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5", 0x65, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:50 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) 00:30:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:30:50 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:50 executing program 4: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 643.852417] BTRFS error (device loop3): superblock checksum mismatch 00:30:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:30:50 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) [ 644.066166] BTRFS error (device loop3): open_ctree failed 00:30:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:30:50 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) 00:30:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b9", 0x98, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 644.463806] BTRFS error (device loop3): superblock checksum mismatch [ 644.506364] BTRFS error (device loop3): open_ctree failed 00:30:53 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b9", 0x98, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) 00:30:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:30:53 executing program 5: epoll_create(0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:53 executing program 4: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:30:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b9", 0x98, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) 00:30:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 00:30:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) 00:30:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688", 0xb1, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:55 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(0x0, 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 00:30:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:30:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688", 0xb1, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:55 executing program 5: epoll_create(0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688", 0xb1, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 00:30:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:30:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688", 0xb1, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:30:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:30:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:57 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x0, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:57 executing program 4: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:30:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 00:30:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:30:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 00:30:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:30:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:30:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 00:30:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9df", 0xc4, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:00 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x0, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:31:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9df", 0xc4, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 00:31:00 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000480)={0x4, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x3, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) sendto$inet6(r0, &(0x7f0000000340), 0x0, 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x486080, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'syz_tun\x00'}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 00:31:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 00:31:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:31:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9df", 0xc4, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)}}], 0x2, 0x0, 0x0) [ 654.575778] protocol 88fb is buggy, dev hsr_slave_0 [ 654.581546] protocol 88fb is buggy, dev hsr_slave_1 00:31:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 654.725175] protocol 88fb is buggy, dev hsr_slave_0 [ 654.730320] protocol 88fb is buggy, dev hsr_slave_1 [ 654.735245] protocol 88fb is buggy, dev hsr_slave_0 [ 654.735409] protocol 88fb is buggy, dev hsr_slave_1 00:31:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)}}], 0x2, 0x0, 0x0) [ 655.845400] protocol 88fb is buggy, dev hsr_slave_0 [ 655.850968] protocol 88fb is buggy, dev hsr_slave_1 00:31:03 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640), 0x0, 0x10000}], 0x0, 0x0) 00:31:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)}}], 0x2, 0x0, 0x0) 00:31:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b", 0xc7, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:03 executing program 4: 00:31:03 executing program 5: epoll_create(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:03 executing program 4: 00:31:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 00:31:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640), 0x0, 0x10000}], 0x0, 0x0) 00:31:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b", 0xc7, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:03 executing program 4: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) r1 = socket(0x10, 0x3, 0x0) dup2(r1, r0) 00:31:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 657.449676] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 657.503840] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 00:31:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 00:31:05 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, 0x0, 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:05 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x802) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000340)='<'}) 00:31:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640), 0x0, 0x10000}], 0x0, 0x0) 00:31:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b", 0xc7, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:05 executing program 5: epoll_create(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @loopback}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) dup3(r0, r1, 0x0) 00:31:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x1, 0x0, 0x0) 00:31:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5", 0x65, 0x10000}], 0x0, 0x0) 00:31:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c", 0xc9, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000280)={0x5, 0x2000000000074, 0x80000001, 0x9ab, 0x0, 0x9}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x9}) 00:31:05 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 00:31:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5", 0x65, 0x10000}], 0x0, 0x0) 00:31:07 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c", 0xc9, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 00:31:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5", 0x65, 0x10000}], 0x0, 0x0) 00:31:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) getpeername(r0, 0x0, &(0x7f0000000000)) 00:31:07 executing program 5: epoll_create(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 661.450447] audit: type=1326 audit(1547685067.778:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17997 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 00:31:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b9", 0x98, 0x10000}], 0x0, 0x0) 00:31:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c", 0xc9, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b9", 0x98, 0x10000}], 0x0, 0x0) 00:31:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b9", 0x98, 0x10000}], 0x0, 0x0) 00:31:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 662.140749] audit: type=1326 audit(1547685068.468:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17997 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 00:31:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:31:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688", 0xb1, 0x10000}], 0x0, 0x0) 00:31:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:09 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f00000011c0)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000001280)=""/112, 0x70}}, {{0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f00000028c0)=""/87, 0xffffffffffffff4f}}], 0x45483d5a560d7693, 0x0, &(0x7f0000002a80)) 00:31:09 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 663.577223] audit: type=1326 audit(1547685069.908:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18060 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 00:31:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 00:31:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688", 0xb1, 0x10000}], 0x0, 0x0) [ 663.917531] BTRFS error (device loop1): superblock checksum mismatch [ 663.965172] BTRFS error (device loop1): open_ctree failed [ 663.975475] BTRFS error (device loop1): superblock checksum mismatch [ 663.986974] BTRFS error (device loop1): open_ctree failed 00:31:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b9", 0x98, 0x10000}], 0x0, 0x0) [ 664.277824] BTRFS error (device loop1): superblock checksum mismatch [ 664.313980] BTRFS error (device loop1): open_ctree failed [ 664.342592] BTRFS error (device loop1): superblock checksum mismatch [ 664.361594] audit: type=1326 audit(1547685070.688:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18060 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 00:31:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x2e4, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) pread64(r0, &(0x7f0000000480)=""/39, 0x27, 0x0) [ 664.425628] BTRFS error (device loop1): open_ctree failed 00:31:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795", 0x7f, 0x10000}], 0x0, 0x0) [ 664.587219] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 664.645765] BTRFS error (device loop3): superblock checksum mismatch [ 664.674288] BTRFS error (device loop3): open_ctree failed 00:31:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 665.067794] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 665.099005] BTRFS error (device loop3): superblock checksum mismatch [ 665.124126] BTRFS error (device loop3): open_ctree failed 00:31:12 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:12 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795", 0x7f, 0x10000}], 0x0, 0x0) 00:31:12 executing program 0: pipe2(0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = epoll_create1(0x80000) r1 = socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) r2 = fcntl$dupfd(r1, 0x4, r1) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x0) pwritev(r0, &(0x7f0000000200)=[{&(0x7f0000000700)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r4 = memfd_create(&(0x7f00000001c0)='/dev/loop#\x00', 0x2) prctl$PR_CAPBSET_DROP(0x18, 0x24) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r2, r3, 0x0, 0x2000006) 00:31:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 00:31:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001180), 0x1000) [ 666.547131] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:31:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000700)=ANY=[@ANYBLOB="140000001d000100fffffffffffffffa7e000000"], 0x1}, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x0) [ 666.638323] BTRFS error (device loop3): superblock checksum mismatch [ 666.665166] BTRFS error (device loop3): open_ctree failed [ 666.676423] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:31:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffe50, 0x9, 0x0, 0xfffffffffffffd94) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='scalable\x00', 0x9) 00:31:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 666.741599] BTRFS error (device loop3): superblock checksum mismatch 00:31:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfffffffffffffffe, @loopback}, {0xa, 0x0, 0x3ff, @remote, 0x2}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="00000000c3ffffff00"}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xc3ffffff]}}}}, 0x48) [ 666.885901] BTRFS error (device loop3): open_ctree failed [ 667.000370] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:31:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c568", 0x66, 0x10000}], 0x0, 0x0) [ 667.045290] BTRFS error (device loop3): superblock checksum mismatch [ 667.068271] BTRFS error (device loop3): open_ctree failed 00:31:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xebf7, 0x0, 0x9}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x9}) [ 667.191086] kvm: emulating exchange as write 00:31:15 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 00:31:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c568", 0x66, 0x10000}], 0x0, 0x0) 00:31:15 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) gettid() listxattr(0x0, &(0x7f0000000180)=""/96, 0x60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x80003, 0x3) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x10) recvmmsg(r1, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) setsockopt$inet_int(r1, 0x0, 0x12, &(0x7f0000000000)=0x73, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f000000a080)=[{{&(0x7f0000008d40)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 00:31:15 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffe50, 0x9, 0x0, 0xfffffffffffffd94) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='scalable\x00', 0x9) [ 669.412131] BTRFS error (device loop1): superblock checksum mismatch [ 669.516087] BTRFS error (device loop1): open_ctree failed [ 669.568021] BTRFS error (device loop1): superblock checksum mismatch 00:31:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 669.635706] BTRFS error (device loop1): open_ctree failed 00:31:16 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, 0x0, r1) 00:31:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:31:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000340)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b3fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d9}) syz_open_pts(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) mkdir(0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) write$P9_RSTATFS(r3, 0x0, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x2) unlinkat(r3, &(0x7f00000003c0)='./file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 669.950832] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 670.015477] BTRFS error (device loop3): superblock checksum mismatch [ 670.065862] BTRFS error (device loop3): open_ctree failed [ 670.101906] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 670.155212] BTRFS error (device loop3): superblock checksum mismatch 00:31:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 670.272048] BTRFS error (device loop3): open_ctree failed 00:31:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffe50, 0x9, 0x0, 0xfffffffffffffd94) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='scalable\x00', 0x9) [ 670.428500] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 670.489374] BTRFS error (device loop3): superblock checksum mismatch [ 670.522345] BTRFS error (device loop3): open_ctree failed 00:31:18 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c00000100", 0x34, 0x10000}], 0x0, 0x0) 00:31:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 00:31:18 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000080)=@nfc={0x27, 0x1}, 0x80, 0x0}}], 0x1, 0x0) 00:31:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffe50, 0x9, 0x0, 0xfffffffffffffd94) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='scalable\x00', 0x9) [ 672.309361] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 672.345309] BTRFS error (device loop3): superblock checksum mismatch 00:31:18 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_names\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e3, 0x0) 00:31:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c00000100", 0x34, 0x10000}], 0x0, 0x0) [ 672.403589] BTRFS error (device loop3): open_ctree failed 00:31:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 00:31:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000a80)="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", 0x599, 0x40000, 0x0, 0x0) 00:31:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c00000100", 0x34, 0x10000}], 0x0, 0x0) [ 672.853652] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 672.924905] BTRFS error (device loop3): superblock checksum mismatch [ 672.943644] BTRFS error (device loop3): open_ctree failed 00:31:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f", 0x41, 0x10000}], 0x0, 0x0) 00:31:21 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:31:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') fchdir(r2) getdents64(r2, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r1) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in=@multicast2}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) r4 = add_key(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000280)="996d43da98a1cc0e70587db1ee3fe4a1735804bde56e9819b9b34a13f79504dad6b5747efacd6e4deed7ea16807bdbe4146e101b9d6e075b872e8cc58e37e9b4400141fb8fe75e12956b04283ecaa6c7b968b50aad3b51176d115a178dbac89f66a421b0d830433eabac47847378ff8e5bf201392de91b74cd0f4b9ec837f6c6a0de6cdfb16c2703f31b1a0138e65ee886d923c0e6d44a1fa5f46a8848934fca86e2b2bcac96fbc8129e2579b2616f5f96e361c7df4abf9f1a5d2a4e6848084ae9eec09edc631d433bed3cbf9e21fce90dba1d3d0f49c546", 0xd8, 0xfffffffffffffff8) keyctl$describe(0x6, r4, &(0x7f00000005c0)=""/241, 0xf1) fstat(r2, &(0x7f0000000540)) write$binfmt_misc(r3, &(0x7f0000000000)={'syz0', "6140d2804c99cc0263b3d2ac14ee7f32"}, 0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000006c0)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000000c0)={0x0, @aes128, 0x2, "4c51a18c64614007"}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, 0x0, 0x0) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000500)=0x5, 0xfffffffffffffe34) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:31:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 00:31:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f", 0x41, 0x10000}], 0x0, 0x0) 00:31:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000a80)="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", 0x599, 0x0, 0x0, 0x0) 00:31:21 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 675.029528] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 675.046915] BTRFS error (device loop3): superblock checksum mismatch [ 675.075878] BTRFS error (device loop3): open_ctree failed 00:31:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xe536, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xfdfdffff}) 00:31:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f", 0x41, 0x10000}], 0x0, 0x0) 00:31:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') fchdir(r2) getdents64(r2, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r1) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@initdev, @in=@multicast2}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) r4 = add_key(0x0, &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000280)="996d43da98a1cc0e70587db1ee3fe4a1735804bde56e9819b9b34a13f79504dad6b5747efacd6e4deed7ea16807bdbe4146e101b9d6e075b872e8cc58e37e9b4400141fb8fe75e12956b04283ecaa6c7b968b50aad3b51176d115a178dbac89f66a421b0d830433eabac47847378ff8e5bf201392de91b74cd0f4b9ec837f6c6a0de6cdfb16c2703f31b1a0138e65ee886d923c0e6d44a1fa5f46a8848934fca86e2b2bcac96fbc8129e2579b2616f5f96e361c7df4abf9f1a5d2a4e6848084ae9eec09edc631d433bed3cbf9e21fce90dba1d3d0f49c546", 0xd8, 0xfffffffffffffff8) keyctl$describe(0x6, r4, &(0x7f00000005c0)=""/241, 0xf1) fstat(r2, &(0x7f0000000540)) write$binfmt_misc(r3, &(0x7f0000000000)={'syz0', "6140d2804c99cc0263b3d2ac14ee7f32"}, 0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000006c0)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f00000000c0)={0x0, @aes128, 0x2, "4c51a18c64614007"}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_INFO(r5, 0x0, 0x60, 0x0, 0x0) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000500)=0x5, 0xfffffffffffffe34) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:31:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 00:31:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0xe536, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xfdfdffff}) 00:31:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000a80)="2d81d6cdd31216a02dcd1a57ced967b0b37c896968d5a648e682b5c0ca1f80c880f44edb2443310e59afc115c2223e4753d8c0930898c7143276cb142c095716caa424e2d83bd258031be8b84205bc0ca8a5edf9e8bfc2f8e5648a0e40b1c82e6bc01b88eb2b14221c3f143eeddd4428fbeb2e76cb92b1d9110e54f2fd41938c28981b47dbf73d089df20236c77fab6753901ebd385f352d29f49de06110736030f1e0d602676946a758176e9cd16219d719769e2ad7999ff8ab859c7ba7f8445344f6390a8bdb0c17934283f23a9a20aaa3202b892235ca81caef092b4dee2fa3c12feae6f5c8e7bc203c13a2861851d747d291937de702b42b02d7b6087ce3ea732cfa8e13363c00ca4a18c776f64e5fb991bc38f90baced5dab26b4fb945968fc06b41bea9f006433c52bd27a85f77d444305d2cc703894eb2f20b4cfffa7500d3209f6e773554e7446267ecc130a376362271e25cd4cf8faa1c2878d681d803be630139b7e9f7df53a7b1d792d6521b53c1dad4a33cfd97e28e52f417e9fadf9996f8898524451d6cb0d8916ccea5bd4b231bf8236ce106611d7e186952ee7ec2f4afb48fe67d93d423b85a8a8db68ee31f3c63aea3b23e1b69c0134f99018ed43c22c0eff926078a63110aa55b8952c13ba51591e283f10c2215d18ebdb949500b8c9f8e369e32462d2a99c95953ce497eead515cb5017378c191da62f7769d49029d15006a1697aead5565cee26f239d7d4eb6cdd3bf247ec479af32ae65090aa43bf0acbecb6e37a57faf64bb698578368b8343f0a68c8d180da1050cab4916af3bd7d3938fbb72ec694e3f2c3bb3679ac07684fdad17dce2a7f2ce408c0d31353a35c6fa191251709bee3d1c990aa54e05bae3642233b5059b9e41ae5970906061df588d7f9a93eb076e88d2786e8da10850ad85ba1deaf716e02d978f80b68b6d91da3ae9f91f54dc9e933ed3d5e51809be40e4cb644c83ed4ed6149c84771c1eda5d067a371fa37a465cf47b47640f54dee710a0b56ba473a3367d50b074eeb28e62bc1a424789a1097f3f6bb3533918ff250c5e8105c4e21dfcc5861cbb99551698040e19e21493f4f43a10ec3c73d937b5f9169c3329554da92227665da7082ac2e56701a770ff14cfdc52853593c770ba2e89bb7863f36edf087d996f5e2c536bff10e3a0309f26f3dc547edaaa2c23d988bf929229f4e5312aa068aef6aef7b285c7f82fa4589d412efa1eca692f45e1b357c439056b3048a518a0bfc139a4ba4898e85f88802095bff29d75632dd118ed78afbb48ba0716d8dfab7883887ba6fbf9014368c429eb64faf1a8d4b13addd3348bbba6e144bb1479b905f9b3885ebeda06df6afd1bb3f7cad8a1246652aa3684a31c4fe5f8e60aee15b6eda7a72238e66bc2f4ba3f8e925203e23371e95d73222b1929103637672c9bfd4e821667ff4aa0bc8a6c8bf965b4b80f81d43f51bbe5c4b5e4488c850d2753ae6881d8c91671bdce43d4ab063e4e3a21ae01275202f629230589eaef6472533efe8baada9d52ec8d22ff88031bec15871cb088086c7388a5320b011d697a9d8078c02d8ef01f6d40e88ec2c8a14e3de5fdac7bca72a945bda9538a4ba63804c30559dc04ad228f6ab9b5d0ebb22b90d64a457c9561d526006d29852c4108094cb03b0064a7a8eb9b2496fa34528c474638f90d785412d6e4eb5a936a78722b26e20a7735f7e686fb57951e60551e1f080bb497ed81f28f0c7a083ec90d675b380204bfdf2ad1188e24bd6dca5f797bb6be3d542cdd56d063d9d5e7d71d12088f50c54c23476c417ff6c7a3740b3d12b3070dc3fb33639623aad842a095e92bd42e5c3145ccf30568302aa58100548c62034768e96acbdc6141e70a2956efc329d33c64e36c443db3c40e082a5a18c58c56feb1b7381e58b07040fc4e8a37a8afdc33498d1685559d3827003b2e56b61159af7526a48c5397953638e4f008abe5ed276f61317351b6bcbd22679e2c6d988a76140a8e689b", 0x59a, 0x0, 0x0, 0x0) 00:31:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 00:31:23 executing program 4: 00:31:23 executing program 3: 00:31:23 executing program 0: 00:31:23 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:23 executing program 2: 00:31:23 executing program 4: 00:31:23 executing program 3: 00:31:23 executing program 0: 00:31:23 executing program 2: 00:31:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 00:31:23 executing program 3: 00:31:23 executing program 4: 00:31:23 executing program 0: 00:31:23 executing program 2: 00:31:23 executing program 3: 00:31:24 executing program 0: 00:31:24 executing program 4: 00:31:24 executing program 2: 00:31:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b30", 0x4a, 0x10000}], 0x0, 0x0) 00:31:24 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:24 executing program 3: 00:31:24 executing program 3: 00:31:24 executing program 2: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000a9cff8)) socket$packet(0x11, 0x3, 0x300) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x0, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x0) 00:31:24 executing program 4: 00:31:24 executing program 0: 00:31:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b30", 0x4a, 0x10000}], 0x0, 0x0) 00:31:24 executing program 4: 00:31:24 executing program 3: 00:31:24 executing program 2: 00:31:24 executing program 0: 00:31:24 executing program 4: [ 678.724940] protocol 88fb is buggy, dev hsr_slave_0 [ 678.730215] protocol 88fb is buggy, dev hsr_slave_1 [ 678.884929] protocol 88fb is buggy, dev hsr_slave_0 [ 678.890009] protocol 88fb is buggy, dev hsr_slave_1 00:31:25 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b30", 0x4a, 0x10000}], 0x0, 0x0) 00:31:25 executing program 3: 00:31:25 executing program 0: 00:31:25 executing program 4: 00:31:25 executing program 2: 00:31:25 executing program 3: 00:31:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 00:31:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/unix\x00') preadv(r1, &(0x7f00000009c0)=[{&(0x7f00000003c0)=""/106, 0x6a}, {&(0x7f0000000440)=""/254, 0xfe}], 0x2, 0x0) 00:31:25 executing program 0: memfd_create(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 00:31:25 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffff4c, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200082}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') 00:31:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4", 0x4c, 0x10000}], 0x0, 0x0) [ 679.524935] protocol 88fb is buggy, dev hsr_slave_0 [ 679.530031] protocol 88fb is buggy, dev hsr_slave_1 [ 679.684932] protocol 88fb is buggy, dev hsr_slave_0 [ 679.690055] protocol 88fb is buggy, dev hsr_slave_1 [ 679.694936] protocol 88fb is buggy, dev hsr_slave_0 [ 679.700187] protocol 88fb is buggy, dev hsr_slave_1 00:31:26 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4", 0x4c, 0x10000}], 0x0, 0x0) 00:31:26 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:26 executing program 4: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:26 executing program 0: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:26 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4", 0x4c, 0x10000}], 0x0, 0x0) 00:31:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d}], 0x0, 0x0) 00:31:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d}], 0x0, 0x0) 00:31:27 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d}], 0x0, 0x0) 00:31:27 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:28 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(0x0, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:29 executing program 0: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688", 0xb1, 0x10000}], 0x0, 0x0) 00:31:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:29 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5", 0x65, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:30 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 683.845008] net_ratelimit: 16 callbacks suppressed [ 683.845017] protocol 88fb is buggy, dev hsr_slave_0 [ 683.855112] protocol 88fb is buggy, dev hsr_slave_1 [ 683.855347] protocol 88fb is buggy, dev hsr_slave_0 [ 683.865577] protocol 88fb is buggy, dev hsr_slave_1 [ 684.965393] protocol 88fb is buggy, dev hsr_slave_0 [ 684.970756] protocol 88fb is buggy, dev hsr_slave_1 [ 685.125266] protocol 88fb is buggy, dev hsr_slave_0 [ 685.130965] protocol 88fb is buggy, dev hsr_slave_1 00:31:31 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(0x0, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 685.765318] protocol 88fb is buggy, dev hsr_slave_0 [ 685.771366] protocol 88fb is buggy, dev hsr_slave_1 00:31:33 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:33 executing program 0: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:33 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 689.125542] net_ratelimit: 14 callbacks suppressed [ 689.125571] protocol 88fb is buggy, dev hsr_slave_0 [ 689.136624] protocol 88fb is buggy, dev hsr_slave_1 00:31:35 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(0x0, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 689.285572] protocol 88fb is buggy, dev hsr_slave_0 [ 689.291087] protocol 88fb is buggy, dev hsr_slave_1 [ 689.925368] protocol 88fb is buggy, dev hsr_slave_0 [ 689.930618] protocol 88fb is buggy, dev hsr_slave_1 [ 690.085644] protocol 88fb is buggy, dev hsr_slave_0 [ 690.091205] protocol 88fb is buggy, dev hsr_slave_1 [ 690.095533] protocol 88fb is buggy, dev hsr_slave_0 [ 690.101424] protocol 88fb is buggy, dev hsr_slave_1 00:31:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) 00:31:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 690.599765] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 690.623015] BTRFS error (device loop3): superblock checksum mismatch [ 690.638892] BTRFS error (device loop3): open_ctree failed 00:31:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5", 0x65, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:31:37 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:31:37 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:31:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:31:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:31:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:31:39 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:31:40 executing program 4: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:40 executing program 2: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ftruncate(0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:40 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 694.245418] net_ratelimit: 16 callbacks suppressed [ 694.245463] protocol 88fb is buggy, dev hsr_slave_0 [ 694.245591] protocol 88fb is buggy, dev hsr_slave_0 [ 694.250870] protocol 88fb is buggy, dev hsr_slave_1 [ 694.255889] protocol 88fb is buggy, dev hsr_slave_1 00:31:40 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:31:41 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000140)) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 00:31:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:31:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:31:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:31:41 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000140)) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) [ 695.365302] protocol 88fb is buggy, dev hsr_slave_0 [ 695.370997] protocol 88fb is buggy, dev hsr_slave_1 [ 695.525648] protocol 88fb is buggy, dev hsr_slave_0 [ 695.531215] protocol 88fb is buggy, dev hsr_slave_1 [ 696.164904] protocol 88fb is buggy, dev hsr_slave_0 [ 696.170062] protocol 88fb is buggy, dev hsr_slave_1 00:31:42 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:31:44 executing program 4: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 00:31:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 00:31:44 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 00:31:44 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000140)) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 00:31:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:31:44 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000140)) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 00:31:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:31:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 699.525650] net_ratelimit: 14 callbacks suppressed [ 699.525673] protocol 88fb is buggy, dev hsr_slave_0 [ 699.536335] protocol 88fb is buggy, dev hsr_slave_1 [ 699.685457] protocol 88fb is buggy, dev hsr_slave_0 [ 699.690854] protocol 88fb is buggy, dev hsr_slave_1 00:31:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:31:46 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 700.325579] protocol 88fb is buggy, dev hsr_slave_0 [ 700.331267] protocol 88fb is buggy, dev hsr_slave_1 [ 700.485283] protocol 88fb is buggy, dev hsr_slave_0 [ 700.485461] protocol 88fb is buggy, dev hsr_slave_0 [ 700.490640] protocol 88fb is buggy, dev hsr_slave_1 [ 700.495535] protocol 88fb is buggy, dev hsr_slave_1 00:31:47 executing program 4: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:31:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:31:48 executing program 3: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ftruncate(0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)}}], 0x2, 0x0, 0x0) 00:31:48 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000140)) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 00:31:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)}}], 0x2, 0x0, 0x0) 00:31:48 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:48 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000140)) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 00:31:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)}}], 0x2, 0x0, 0x0) 00:31:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 00:31:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 00:31:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getmulticast={0x14}, 0x14}}, 0x0) 00:31:50 executing program 4: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 704.644969] net_ratelimit: 16 callbacks suppressed [ 704.644977] protocol 88fb is buggy, dev hsr_slave_0 [ 704.645302] protocol 88fb is buggy, dev hsr_slave_0 [ 704.650023] protocol 88fb is buggy, dev hsr_slave_1 [ 704.655461] protocol 88fb is buggy, dev hsr_slave_1 00:31:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x1, 0x0, 0x0) 00:31:51 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x1ffffd, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'nr0\x00', 0x0}) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000180)={0x3, 0x0, [{0xc0000000, 0x6, 0x2, 0x4a, 0x3, 0x6, 0x9}, {0x7, 0x7584, 0x5, 0x1, 0xac, 0xfffffffffffffe00, 0x800}, {0x2, 0x8, 0x1, 0xfffffffffffffffa, 0x7fff800000, 0x7, 0x80}]}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001400)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000001500)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001540)={{{@in=@multicast2, @in6=@mcast1, 0x4e20, 0x9, 0x4e23, 0x2000, 0xa, 0x80, 0x0, 0x89, r1, r2}, {0x8000, 0x0, 0x9ce, 0x3f, 0x4, 0x1000, 0x7fff, 0x6}, {0x400, 0xffff, 0x1, 0x2}, 0x6, 0x0, 0x2, 0x1, 0x2, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d2, 0x3f}, 0xa, @in=@multicast1, 0x3506, 0x4, 0x3, 0x34bca7d4, 0x0, 0x5, 0x9}}, 0xe8) setrlimit(0xf, &(0x7f0000000040)={0x8, 0x6}) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000000c0)={@remote}, &(0x7f0000000140)=0x14) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getmulticast={0x14, 0x3a, 0x305}, 0x14}}, 0x0) 00:31:52 executing program 1: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:52 executing program 0: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:52 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x1ffffd, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) r1 = socket(0x10, 0x3, 0x0) r2 = getpid() r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x24, r3, 0x400, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) wait4(r2, &(0x7f0000000040), 0x80000000, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000003a00050094d4ec5a3a0d416acded92a1aa50f2dbeb1188010001000000000012c90692bf5aeecccd23e0f05f3c5c2d6b4bad59c544bd109400b6246e916d36e63e4512dc574bebece2faf4604d9efe24016f2ffcb672a5ad7cca08340ce0ba0cfdcecc5318806f1a8cab6ccb61cd7f8f434b133aef"], 0x14}}, 0x0) 00:31:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) 00:31:52 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 705.765101] protocol 88fb is buggy, dev hsr_slave_0 [ 705.770819] protocol 88fb is buggy, dev hsr_slave_1 00:31:52 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x1ffffd, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) r1 = socket(0x10, 0x3, 0x0) r2 = getpid() r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x24, r3, 0x400, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) wait4(r2, &(0x7f0000000040), 0x80000000, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000003a00050094d4ec5a3a0d416acded92a1aa50f2dbeb1188010001000000000012c90692bf5aeecccd23e0f05f3c5c2d6b4bad59c544bd109400b6246e916d36e63e4512dc574bebece2faf4604d9efe24016f2ffcb672a5ad7cca08340ce0ba0cfdcecc5318806f1a8cab6ccb61cd7f8f434b133aef"], 0x14}}, 0x0) [ 705.929147] protocol 88fb is buggy, dev hsr_slave_0 [ 705.934626] protocol 88fb is buggy, dev hsr_slave_1 00:31:52 executing program 2: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:52 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x1ffffd, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) r1 = socket(0x10, 0x3, 0x0) r2 = getpid() r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x24, r3, 0x400, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) wait4(r2, &(0x7f0000000040), 0x80000000, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000003a00050094d4ec5a3a0d416acded92a1aa50f2dbeb1188010001000000000012c90692bf5aeecccd23e0f05f3c5c2d6b4bad59c544bd109400b6246e916d36e63e4512dc574bebece2faf4604d9efe24016f2ffcb672a5ad7cca08340ce0ba0cfdcecc5318806f1a8cab6ccb61cd7f8f434b133aef"], 0x14}}, 0x0) [ 706.525012] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=18852 comm=syz-executor3 [ 706.575595] protocol 88fb is buggy, dev hsr_slave_0 [ 706.580933] protocol 88fb is buggy, dev hsr_slave_1 00:31:54 executing program 4: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getmulticast={0x14, 0x3a, 0x305}, 0x14}}, 0x0) 00:31:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getmulticast={0x14, 0x3a, 0x305}, 0x14}}, 0x0) 00:31:55 executing program 3: ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getmulticast={0x14, 0x3a, 0x305}, 0x14}}, 0x0) 00:31:55 executing program 1: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:55 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:55 executing program 3: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:55 executing program 0: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:55 executing program 2: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) [ 709.925189] net_ratelimit: 14 callbacks suppressed [ 709.925217] protocol 88fb is buggy, dev hsr_slave_0 [ 709.936099] protocol 88fb is buggy, dev hsr_slave_1 [ 710.085026] protocol 88fb is buggy, dev hsr_slave_0 [ 710.090210] protocol 88fb is buggy, dev hsr_slave_1 [ 710.735527] protocol 88fb is buggy, dev hsr_slave_0 [ 710.741624] protocol 88fb is buggy, dev hsr_slave_1 [ 710.884940] protocol 88fb is buggy, dev hsr_slave_0 [ 710.885439] protocol 88fb is buggy, dev hsr_slave_0 [ 710.890067] protocol 88fb is buggy, dev hsr_slave_1 [ 710.900960] protocol 88fb is buggy, dev hsr_slave_1 00:31:58 executing program 4: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:59 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:31:59 executing program 3: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:59 executing program 0: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:59 executing program 1: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:31:59 executing program 2: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) [ 715.045677] net_ratelimit: 16 callbacks suppressed [ 715.045753] protocol 88fb is buggy, dev hsr_slave_0 [ 715.055408] protocol 88fb is buggy, dev hsr_slave_0 [ 715.056090] protocol 88fb is buggy, dev hsr_slave_1 [ 715.061035] protocol 88fb is buggy, dev hsr_slave_1 00:32:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getmulticast={0x14, 0x3a, 0x305}, 0x14}}, 0x0) 00:32:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e38e06c5fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b53606000000000000007c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df1001000000000694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b22645cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f580968af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb010100000000000001a047526865c888c9ff36056cc4ad258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1, 0x81) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:32:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"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"}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1, 0x81) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 716.168799] protocol 88fb is buggy, dev hsr_slave_0 [ 716.174409] protocol 88fb is buggy, dev hsr_slave_1 [ 716.325712] protocol 88fb is buggy, dev hsr_slave_0 [ 716.331348] protocol 88fb is buggy, dev hsr_slave_1 00:32:02 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:02 executing program 0: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:32:03 executing program 1: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:32:03 executing program 3: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:32:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"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"}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1, 0x81) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 716.964929] protocol 88fb is buggy, dev hsr_slave_0 [ 716.970239] protocol 88fb is buggy, dev hsr_slave_1 00:32:03 executing program 4: syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x0, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x1ffffd, 0x182) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000001500)={&(0x7f0000000380), 0xc, &(0x7f00000014c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="04010000100001000000000000000000e0000001000000000000000000000000ac1414aa00000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e000000200000000000000000000000000002b0000000000000000000000000000000000000000000000000000000000000000000000000800000000000000874c8d86eeb6eb8766117e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000800000000000000000014000e0000000000000000000000000000000000f10691ccdc062d2bd6daa1adb77e166ffd6a0659cb288c4d47127e109229bb75"], 0x104}}, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000200)="b65b5dc085716006a81dd4db600c56bbe856e3bea905d7441dd51ec3295753a3cb5ed45ddae6d7e96af9ee3523ad4fa1ae79adbd6e6b16fa60b884ba77737550bf4f8b4d64d873fdeb738b74409c1564", 0x50, 0xfffffffffffffffa) r3 = geteuid() r4 = getgid() keyctl$chown(0x4, r2, r3, r4) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, &(0x7f0000000340)) exit_group(0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000003a00050300000000000000000a0000000180e06d03c95235ae2a1a5ff740071a17d39a7ec2e376c3abff88fff6e7b87e714c11593050ab66572906f41904e3436cf84628f7975cfd4a6f3157adc3fc81913093"], 0x14}}, 0x0) 00:32:03 executing program 2: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) [ 717.295464] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. 00:32:04 executing program 0: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:32:04 executing program 4 (fault-call:4 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 717.871195] FAULT_INJECTION: forcing a failure. [ 717.871195] name failslab, interval 1, probability 0, space 0, times 0 [ 717.936551] CPU: 1 PID: 18956 Comm: syz-executor4 Not tainted 5.0.0-rc2+ #29 [ 717.943790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.953148] Call Trace: [ 717.955753] dump_stack+0x1db/0x2d0 [ 717.959394] ? dump_stack_print_info.cold+0x20/0x20 [ 717.964475] ? remove_wait_queue+0x198/0x300 [ 717.968907] should_fail.cold+0xa/0x15 [ 717.972811] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 717.977935] ? ___might_sleep+0x1e7/0x310 [ 717.982106] ? arch_local_save_flags+0x50/0x50 [ 717.986694] ? lockdep_hardirqs_on+0x415/0x5d0 [ 717.991290] __should_failslab+0x121/0x190 [ 717.995535] should_failslab+0x9/0x14 [ 717.999347] __kmalloc+0x2dc/0x740 [ 718.002947] ? __local_bh_enable_ip+0x15a/0x270 [ 718.007679] ? sock_kmalloc+0x166/0x200 [ 718.011666] sock_kmalloc+0x166/0x200 [ 718.015476] ? __sk_mem_schedule+0xe0/0xe0 [ 718.019770] ? af_alg_release+0x80/0x80 [ 718.023752] ? lock_sock_nested+0xe2/0x120 [ 718.027999] af_alg_alloc_areq+0x7c/0x300 [ 718.032154] ? alg_accept+0x60/0x60 [ 718.035794] ? __local_bh_enable_ip+0x15a/0x270 [ 718.040477] skcipher_recvmsg+0x2ec/0x1260 [ 718.044722] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 718.050280] ? skcipher_bind+0x30/0x30 [ 718.054176] ? skcipher_bind+0x30/0x30 [ 718.058127] sock_recvmsg_nosec+0x8c/0xb0 [ 718.062284] ? __sock_tx_timestamp+0xd0/0xd0 [ 718.066698] ___sys_recvmsg+0x2a8/0x680 [ 718.070690] ? ___sys_sendmsg+0x910/0x910 [ 718.074841] ? find_held_lock+0x35/0x120 [ 718.078911] ? get_pid_task+0xd4/0x190 [ 718.082806] ? __might_fault+0x12b/0x1e0 [ 718.086873] ? find_held_lock+0x35/0x120 [ 718.090943] ? __might_fault+0x12b/0x1e0 [ 718.095008] ? lock_acquire+0x1db/0x570 [ 718.099016] ? ___might_sleep+0x1e7/0x310 [ 718.103191] ? arch_local_save_flags+0x50/0x50 [ 718.107794] do_recvmmsg+0x2f8/0xc40 [ 718.111529] ? ___sys_recvmsg+0x680/0x680 [ 718.115698] ? wait_for_completion+0x810/0x810 [ 718.120303] ? __sb_end_write+0xd9/0x110 [ 718.124374] __sys_recvmmsg+0x259/0x270 [ 718.128365] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 718.132703] ? trace_hardirqs_on+0xbd/0x310 [ 718.137055] ? __ia32_sys_read+0xb0/0xb0 [ 718.141123] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.146494] ? trace_hardirqs_off_caller+0x300/0x300 [ 718.151605] __x64_sys_recvmmsg+0xe6/0x140 [ 718.155856] do_syscall_64+0x1a3/0x800 [ 718.159754] ? syscall_return_slowpath+0x5f0/0x5f0 [ 718.164689] ? prepare_exit_to_usermode+0x232/0x3b0 [ 718.169719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.174593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.179782] RIP: 0033:0x457ec9 [ 718.182978] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.201879] RSP: 002b:00007f0dba172c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 718.209593] RAX: ffffffffffffffda RBX: 00007f0dba172c90 RCX: 0000000000457ec9 [ 718.216861] RDX: 0000000000000002 RSI: 00000000200006c0 RDI: 0000000000000004 [ 718.224133] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 718.231406] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0dba1736d4 [ 718.238678] R13: 00000000004c4b0e R14: 00000000004d8390 R15: 0000000000000005 00:32:04 executing program 4 (fault-call:4 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x4, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:06 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x8, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:06 executing program 1: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:32:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) [ 720.325920] net_ratelimit: 13 callbacks suppressed [ 720.326014] protocol 88fb is buggy, dev hsr_slave_0 [ 720.336775] protocol 88fb is buggy, dev hsr_slave_1 [ 720.485239] protocol 88fb is buggy, dev hsr_slave_0 [ 720.490568] protocol 88fb is buggy, dev hsr_slave_1 00:32:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0xf, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:07 executing program 2: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:32:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 721.125637] protocol 88fb is buggy, dev hsr_slave_0 [ 721.130897] protocol 88fb is buggy, dev hsr_slave_1 [ 721.292421] protocol 88fb is buggy, dev hsr_slave_0 [ 721.295305] protocol 88fb is buggy, dev hsr_slave_0 [ 721.297678] protocol 88fb is buggy, dev hsr_slave_1 [ 721.302604] protocol 88fb is buggy, dev hsr_slave_1 00:32:07 executing program 0: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:32:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x47, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0xf00, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:09 executing program 3: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x1) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x14}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:32:09 executing program 3: pipe2(0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000040)={'nr0\x00', @remote}) r0 = epoll_create1(0x80000) r1 = socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) r2 = fcntl$dupfd(r1, 0x4, r1) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x4) pwritev(r0, &(0x7f0000000200)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) sendfile(r2, r3, 0x0, 0x2000006) 00:32:09 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x4700, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:10 executing program 1: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:32:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x40000, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000bc0)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 00:32:10 executing program 2: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:32:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x8000000, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:11 executing program 0: epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x401) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x301300, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000007c0)={0x0, 0x70, 0x0, 0x8, 0x72e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x100, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff001, 0x6, 0x0, 0x0, 0xec86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7c9, 0x10000}, 0x0, 0x0, 0x0, 0x7, 0x7a, 0x7, 0x6}) accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80800) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r1, 0x0) 00:32:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0xf000000, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x10000000, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000bc0)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 00:32:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x47000000, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 725.445823] net_ratelimit: 16 callbacks suppressed [ 725.445869] protocol 88fb is buggy, dev hsr_slave_0 [ 725.454885] protocol 88fb is buggy, dev hsr_slave_0 [ 725.456153] protocol 88fb is buggy, dev hsr_slave_1 [ 725.461001] protocol 88fb is buggy, dev hsr_slave_1 [ 726.564912] protocol 88fb is buggy, dev hsr_slave_0 [ 726.570545] protocol 88fb is buggy, dev hsr_slave_1 [ 726.725385] protocol 88fb is buggy, dev hsr_slave_0 [ 726.731152] protocol 88fb is buggy, dev hsr_slave_1 00:32:13 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000bc0)='./file0\x00') open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) [ 727.365597] protocol 88fb is buggy, dev hsr_slave_0 [ 727.371215] protocol 88fb is buggy, dev hsr_slave_1 00:32:14 executing program 1: pipe2(0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) r1 = fcntl$dupfd(r0, 0x4, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = memfd_create(0x0, 0x2) prctl$PR_CAPBSET_DROP(0x18, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, 0x0, 0x2000006) 00:32:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x4000000000000, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:14 executing program 3: pipe2(0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000040)={'nr0\x00', @remote}) r0 = epoll_create1(0x80000) r1 = socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) r2 = fcntl$dupfd(r1, 0x4, r1) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x4) pwritev(r0, &(0x7f0000000200)=[{&(0x7f0000000700)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x408000, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r4 = memfd_create(&(0x7f00000001c0)='/dev/loop#\x00', 0x2) pwritev(r4, 0x0, 0x0, 0x81806) prctl$PR_CAPBSET_DROP(0x18, 0x24) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000100)) sendfile(r2, r3, 0x0, 0x2000006) 00:32:14 executing program 2: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000200)) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f00000002c0)) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$eventfd(r0, &(0x7f0000000280), 0xfffffe0e) munmap(&(0x7f0000443000/0x400000)=nil, 0x400000) delete_module(0x0, 0x800) 00:32:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x800000000000000, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:14 executing program 0: r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000200)=0x7fffffff) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) clock_settime(0x0, &(0x7f00000002c0)) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$eventfd(r1, &(0x7f0000000280), 0xfffffe0e) write$P9_RMKDIR(r1, 0x0, 0x0) 00:32:14 executing program 1: pipe2(0x0, 0x0) r0 = epoll_create1(0x80000) r1 = socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) r2 = fcntl$dupfd(r1, 0x4, r1) pwritev(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r4 = memfd_create(&(0x7f00000001c0)='/dev/loop#\x00', 0x2) prctl$PR_CAPBSET_DROP(0x18, 0x24) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r2, r3, 0x0, 0x2000006) 00:32:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/icmp\x00') lseek(r0, 0x200000000000007, 0x0) 00:32:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0xf00000000000000, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:14 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="73797374656d5f753a67626a6563740200000000000000635f743a733020756e636f6e66696e08b75f753a73797374656d5f723a6f645f743a73302d73303a63302e633130323320303030303030303ea85507f11ebdb03030303031202e2f66696c653000000000004a8ec7ef8a4a"], 0x6f) 00:32:16 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/uts\x00') 00:32:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x1000000000000000, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:16 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:16 executing program 0: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x8000000000141042, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000500)={0x43, 0x9, 0x0, {0x0, 0x0, 0x0, 0x4}}, 0x43) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:32:16 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x9, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="056304400000000092"], 0x0, 0x0, 0x0}) 00:32:16 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)) [ 729.942398] binder: 19138:19144 unknown command 146 00:32:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:16 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x300) 00:32:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x4700000000000000, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 729.981040] binder: 19138:19144 ioctl c0306201 20000240 returned -22 [ 730.046611] binder: BINDER_SET_CONTEXT_MGR already set [ 730.082984] binder: 19138:19155 unknown command 146 [ 730.145482] input:  as /devices/virtual/input/input5 [ 730.159996] binder: 19138:19153 ioctl 40046207 0 returned -16 [ 730.170999] input: failed to attach handler leds to device input5, error: -6 00:32:16 executing program 0: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x800094, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x8000000000141042, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000500)={0x43}, 0x43) [ 730.189534] binder: 19138:19155 ioctl c0306201 20000240 returned -22 00:32:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 730.297793] input:  as /devices/virtual/input/input6 00:32:16 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') 00:32:16 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000040)={0x6, 0x4, {0x0, 0x0, 0x6, {0x6, 0x1ff}, {}, @const={0x0, {0x1, 0xe8a, 0x0, 0x9}}}, {0x0, 0x1000, 0x8001, {0xffffffffffffff81}, {0x8f}, @cond=[{0x1, 0x0, 0x101}, {0x0, 0x4, 0x8, 0x5}]}}) rmdir(&(0x7f00000000c0)='./file0\x00') [ 730.328401] input: failed to attach handler leds to device input6, error: -6 00:32:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 730.724910] net_ratelimit: 14 callbacks suppressed [ 730.724918] protocol 88fb is buggy, dev hsr_slave_0 [ 730.735004] protocol 88fb is buggy, dev hsr_slave_1 [ 730.894958] protocol 88fb is buggy, dev hsr_slave_0 [ 730.900103] protocol 88fb is buggy, dev hsr_slave_1 [ 731.525134] protocol 88fb is buggy, dev hsr_slave_0 [ 731.530247] protocol 88fb is buggy, dev hsr_slave_1 [ 731.684932] protocol 88fb is buggy, dev hsr_slave_0 [ 731.684997] protocol 88fb is buggy, dev hsr_slave_0 [ 731.690047] protocol 88fb is buggy, dev hsr_slave_1 [ 731.695395] protocol 88fb is buggy, dev hsr_slave_1 00:32:18 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:18 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') 00:32:18 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=""/96, 0x60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x3) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x73, 0x4) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000a080)=[{{&(0x7f0000008d40)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x1, 0x0) 00:32:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)) 00:32:18 executing program 3: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x800094, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x8000000000141042, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000500)={0x43, 0x9, 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}}, 0x43) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f00000002c0)='y\x00', 0x2, 0x2) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:32:18 executing program 1: readv(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2000000000003d) ptrace$cont(0x20, r0, 0x0, 0x7) exit(0x0) 00:32:18 executing program 0: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f000003cff4)) 00:32:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000340)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b3fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d9}) syz_open_pts(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) mkdir(0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x2) unlinkat(r3, &(0x7f00000003c0)='./file0\x00', 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:32:18 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:18 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8), 0x8, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) [ 732.470480] input:  as /devices/virtual/input/input10 [ 732.515739] input: failed to attach handler leds to device input10, error: -6 [ 732.590784] input:  as /devices/virtual/input/input11 [ 732.621918] input: failed to attach handler leds to device input11, error: -6 00:32:20 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) 00:32:20 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000100)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "80"}, 0x119) socket$inet(0x2, 0x0, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000040)={0x8, 0xbb0d497c}, 0x27c) 00:32:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d00224f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) 00:32:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) 00:32:20 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000140)=""/185) [ 734.152766] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz0] on syz1 [ 734.174280] BTRFS: device fsid ecf6f2a2-2997-48ae-1f08-00d00224f03c devid 70 transid 12498261560847380539 /dev/loop3 00:32:20 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) writev(r0, &(0x7f00000011c0)=[{&(0x7f00000001c0)='p', 0x1}], 0x1) 00:32:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 734.306894] hid-generic 0000:0000:0000.000A: hidraw1: HID v0.00 Device [syz0] on syz1 00:32:20 executing program 1: r0 = getpid() syz_open_procfs$namespace(r0, &(0x7f0000000180)='\x00\x00\x00') 00:32:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000001180)='user\x00', &(0x7f00000011c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 00:32:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 734.432086] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 734.469282] BTRFS error (device loop3): superblock checksum mismatch [ 734.605268] BTRFS error (device loop3): open_ctree failed [ 734.739445] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 734.752617] BTRFS error (device loop3): superblock checksum mismatch [ 734.835016] BTRFS error (device loop3): open_ctree failed [ 735.844924] net_ratelimit: 16 callbacks suppressed [ 735.844932] protocol 88fb is buggy, dev hsr_slave_0 [ 735.844978] protocol 88fb is buggy, dev hsr_slave_1 [ 735.849946] protocol 88fb is buggy, dev hsr_slave_1 00:32:22 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0xffffffff, 0x0, 0xffffffffffffffff}) 00:32:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000180)=[{{}, 0x1, 0x7f, 0x2}], 0x22e) 00:32:22 executing program 0: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='cpuset\x00\xb5\xb5\x94\xff\x1c\v\x81\x88\x13\xb1\x9d\x01\xacmz\xea^\xbb2\xcfL\xdcl\x1cO\xa2\"\x01\x9d\xe5~+i\x9dj6e\xfc\xf7\xf7\xa6\b\xa0\xa2\xdf\x7f\xe6\'\xf8\xfe\xbf \x05\x96\xfb\x17{.\xa9\'\xf6gR\xa6Zy#\\T\xef\xbf_\x10/\xcd\x06\xfc-\x89\xf4\x9b\xb3F1uCc\xf0\r\xd1\xfa:\xcb\x94\fA\x95\x8e\xd2\x05\xe2\x19\xcf\x0e\xe1\x12]\x94\xc6\x00\x14\xa9\xf2\x84\xb6\x81^O\x16\x05') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x88004) 00:32:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) 00:32:22 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x4, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) semget$private(0x0, 0x0, 0x0) geteuid() stat(0x0, 0x0) getuid() semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x20000102000007) 00:32:22 executing program 0: 00:32:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:22 executing program 3: 00:32:22 executing program 1: 00:32:22 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000a01000000000000000000009500000000000000"], 0x0, 0x5c4, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000001280)=r1, 0x4) [ 736.975455] protocol 88fb is buggy, dev hsr_slave_0 [ 736.981083] protocol 88fb is buggy, dev hsr_slave_1 [ 737.124940] protocol 88fb is buggy, dev hsr_slave_0 [ 737.130071] protocol 88fb is buggy, dev hsr_slave_1 00:32:23 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(0x0, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000002c0081aee4050cecb0eba06ac40004003300000000000000000000001000000000000000000000e10000", 0x2e}], 0x1}, 0x0) 00:32:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r1, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x80, 0x0}, 0x0) 00:32:23 executing program 1: 00:32:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:23 executing program 3: 00:32:24 executing program 1: [ 737.675528] netlink: 10 bytes leftover after parsing attributes in process `syz-executor0'. [ 737.704490] netlink: 10 bytes leftover after parsing attributes in process `syz-executor0'. 00:32:24 executing program 3: [ 737.764910] protocol 88fb is buggy, dev hsr_slave_0 [ 737.770087] protocol 88fb is buggy, dev hsr_slave_1 00:32:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:24 executing program 0: 00:32:24 executing program 2: [ 737.924911] protocol 88fb is buggy, dev hsr_slave_0 00:32:24 executing program 1: 00:32:25 executing program 0: 00:32:25 executing program 3: 00:32:25 executing program 2: 00:32:25 executing program 1: 00:32:25 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:25 executing program 3: 00:32:25 executing program 1: 00:32:25 executing program 2: 00:32:25 executing program 0: 00:32:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:25 executing program 1: 00:32:25 executing program 3: 00:32:26 executing program 2: 00:32:26 executing program 0: 00:32:27 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:27 executing program 1: 00:32:27 executing program 3: 00:32:27 executing program 2: 00:32:27 executing program 0: [ 741.124941] net_ratelimit: 13 callbacks suppressed [ 741.124948] protocol 88fb is buggy, dev hsr_slave_0 [ 741.135098] protocol 88fb is buggy, dev hsr_slave_1 00:32:27 executing program 0: 00:32:27 executing program 2: 00:32:27 executing program 1: 00:32:27 executing program 3: 00:32:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 741.284904] protocol 88fb is buggy, dev hsr_slave_0 [ 741.290003] protocol 88fb is buggy, dev hsr_slave_1 00:32:27 executing program 0: [ 741.925136] protocol 88fb is buggy, dev hsr_slave_0 [ 741.930690] protocol 88fb is buggy, dev hsr_slave_1 [ 742.085463] protocol 88fb is buggy, dev hsr_slave_0 [ 742.090841] protocol 88fb is buggy, dev hsr_slave_1 [ 742.094873] protocol 88fb is buggy, dev hsr_slave_0 [ 742.100950] protocol 88fb is buggy, dev hsr_slave_1 00:32:29 executing program 3: 00:32:29 executing program 2: 00:32:29 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:29 executing program 1: 00:32:29 executing program 0: 00:32:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:29 executing program 0: 00:32:29 executing program 1: 00:32:29 executing program 2: 00:32:29 executing program 3: 00:32:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:29 executing program 0: 00:32:29 executing program 3: 00:32:30 executing program 1: 00:32:30 executing program 2: 00:32:30 executing program 3: 00:32:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:30 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:30 executing program 0: 00:32:30 executing program 1: 00:32:30 executing program 3: 00:32:30 executing program 2: 00:32:30 executing program 0: 00:32:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:31 executing program 0: 00:32:31 executing program 2: 00:32:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x8}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:31 executing program 3: [ 746.244886] net_ratelimit: 16 callbacks suppressed [ 746.244893] protocol 88fb is buggy, dev hsr_slave_0 [ 746.244937] protocol 88fb is buggy, dev hsr_slave_1 [ 746.250049] protocol 88fb is buggy, dev hsr_slave_1 00:32:32 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:32 executing program 1: 00:32:32 executing program 0: 00:32:32 executing program 2: 00:32:32 executing program 3: 00:32:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xf}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:32 executing program 3: 00:32:32 executing program 1: 00:32:32 executing program 2: 00:32:32 executing program 0: 00:32:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x10}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:32 executing program 2: [ 747.365349] protocol 88fb is buggy, dev hsr_slave_0 [ 747.370816] protocol 88fb is buggy, dev hsr_slave_1 [ 747.524972] protocol 88fb is buggy, dev hsr_slave_0 [ 747.530091] protocol 88fb is buggy, dev hsr_slave_1 00:32:34 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:34 executing program 1: 00:32:34 executing program 3: 00:32:34 executing program 0: 00:32:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x47}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:34 executing program 2: 00:32:34 executing program 3: 00:32:34 executing program 2: 00:32:34 executing program 0: 00:32:34 executing program 1: 00:32:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xf00}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 748.164934] protocol 88fb is buggy, dev hsr_slave_0 [ 748.170077] protocol 88fb is buggy, dev hsr_slave_1 00:32:34 executing program 2: [ 748.324896] protocol 88fb is buggy, dev hsr_slave_0 00:32:36 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:36 executing program 3: 00:32:36 executing program 0: 00:32:36 executing program 1: 00:32:36 executing program 2: 00:32:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4700}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:36 executing program 3: 00:32:36 executing program 1: 00:32:36 executing program 2: 00:32:36 executing program 0: 00:32:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:36 executing program 3: 00:32:37 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(0x0, 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:37 executing program 1: 00:32:37 executing program 0: 00:32:37 executing program 2: 00:32:37 executing program 3: 00:32:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x8000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:37 executing program 3: 00:32:37 executing program 2: 00:32:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xf000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:37 executing program 1: [ 751.524939] net_ratelimit: 13 callbacks suppressed [ 751.524946] protocol 88fb is buggy, dev hsr_slave_0 [ 751.535570] protocol 88fb is buggy, dev hsr_slave_1 00:32:37 executing program 0: 00:32:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffe50, 0x9, 0x0, 0xfffffffffffffd94) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) [ 751.685679] protocol 88fb is buggy, dev hsr_slave_0 [ 751.691187] protocol 88fb is buggy, dev hsr_slave_1 [ 752.335585] protocol 88fb is buggy, dev hsr_slave_0 [ 752.341383] protocol 88fb is buggy, dev hsr_slave_1 [ 752.485463] protocol 88fb is buggy, dev hsr_slave_0 [ 752.485580] protocol 88fb is buggy, dev hsr_slave_0 [ 752.490960] protocol 88fb is buggy, dev hsr_slave_1 [ 752.495961] protocol 88fb is buggy, dev hsr_slave_1 00:32:39 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x0, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:39 executing program 2: 00:32:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x10000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:39 executing program 1: 00:32:39 executing program 0: 00:32:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffe50, 0x9, 0x0, 0xfffffffffffffd94) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) 00:32:39 executing program 1: 00:32:39 executing program 0: 00:32:39 executing program 2: 00:32:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x47000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x3, 0x0, [0xc0000100, 0x6800, 0x40000084], [0xc2]}) 00:32:40 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) [ 753.885402] kvm [19677]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0 00:32:41 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x0, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x14}) r1 = syz_open_pts(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xe) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) 00:32:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffe50, 0x9, 0x0, 0xfffffffffffffd94) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) 00:32:41 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 755.433549] input: syz1 as /devices/virtual/input/input13 [ 755.472406] input: syz1 as /devices/virtual/input/input14 00:32:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x800000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0xf00000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 755.777051] input: syz1 as /devices/virtual/input/input15 00:32:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x1000000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 756.160750] input: syz1 as /devices/virtual/input/input16 00:32:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x4700000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 756.645574] net_ratelimit: 16 callbacks suppressed [ 756.645601] protocol 88fb is buggy, dev hsr_slave_0 [ 756.645613] protocol 88fb is buggy, dev hsr_slave_0 [ 756.650909] protocol 88fb is buggy, dev hsr_slave_1 [ 756.656088] protocol 88fb is buggy, dev hsr_slave_1 [ 757.765770] protocol 88fb is buggy, dev hsr_slave_0 [ 757.771650] protocol 88fb is buggy, dev hsr_slave_1 [ 757.925517] protocol 88fb is buggy, dev hsr_slave_0 [ 757.930893] protocol 88fb is buggy, dev hsr_slave_1 00:32:44 executing program 0: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x0, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:44 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:44 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:44 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 758.487128] input: syz1 as /devices/virtual/input/input17 [ 758.564965] protocol 88fb is buggy, dev hsr_slave_0 [ 758.570205] protocol 88fb is buggy, dev hsr_slave_1 00:32:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 758.921569] input: syz1 as /devices/virtual/input/input18 00:32:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 759.252616] input: syz1 as /devices/virtual/input/input19 00:32:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x47}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:48 executing program 0: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x0, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:48 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:48 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:48 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 761.924924] net_ratelimit: 14 callbacks suppressed [ 761.924930] protocol 88fb is buggy, dev hsr_slave_0 [ 761.934992] protocol 88fb is buggy, dev hsr_slave_1 [ 762.006041] input: syz1 as /devices/virtual/input/input20 00:32:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4700}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 762.084928] protocol 88fb is buggy, dev hsr_slave_0 [ 762.090042] protocol 88fb is buggy, dev hsr_slave_1 00:32:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 762.315312] input: syz1 as /devices/virtual/input/input21 00:32:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 762.652375] input: syz1 as /devices/virtual/input/input22 00:32:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 762.724932] protocol 88fb is buggy, dev hsr_slave_0 [ 762.730030] protocol 88fb is buggy, dev hsr_slave_1 00:32:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 762.884896] protocol 88fb is buggy, dev hsr_slave_0 [ 762.884919] protocol 88fb is buggy, dev hsr_slave_0 [ 762.890106] protocol 88fb is buggy, dev hsr_slave_1 [ 762.895209] protocol 88fb is buggy, dev hsr_slave_1 [ 763.011121] input: syz1 as /devices/virtual/input/input23 00:32:51 executing program 0: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x0, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:51 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:51 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:51 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:51 executing program 2: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 00:32:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:52 executing program 2: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 00:32:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x47000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:52 executing program 2: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 00:32:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 767.045735] net_ratelimit: 16 callbacks suppressed [ 767.045780] protocol 88fb is buggy, dev hsr_slave_0 [ 767.046114] protocol 88fb is buggy, dev hsr_slave_1 [ 767.050988] protocol 88fb is buggy, dev hsr_slave_1 [ 768.165428] protocol 88fb is buggy, dev hsr_slave_0 [ 768.170948] protocol 88fb is buggy, dev hsr_slave_1 [ 768.325176] protocol 88fb is buggy, dev hsr_slave_0 [ 768.330673] protocol 88fb is buggy, dev hsr_slave_1 00:32:55 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:32:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:55 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, 0x0, 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:55 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(0x0, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:55 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 768.940623] FAULT_INJECTION: forcing a failure. [ 768.940623] name failslab, interval 1, probability 0, space 0, times 0 [ 768.965673] protocol 88fb is buggy, dev hsr_slave_0 [ 768.971113] protocol 88fb is buggy, dev hsr_slave_1 [ 769.051353] CPU: 1 PID: 19897 Comm: syz-executor0 Not tainted 5.0.0-rc2+ #29 [ 769.058585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 769.068066] Call Trace: [ 769.070667] dump_stack+0x1db/0x2d0 [ 769.074312] ? dump_stack_print_info.cold+0x20/0x20 [ 769.079354] should_fail.cold+0xa/0x15 [ 769.083271] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 769.088397] ? ___might_sleep+0x1e7/0x310 [ 769.092557] ? arch_local_save_flags+0x50/0x50 [ 769.097163] __should_failslab+0x121/0x190 [ 769.101417] should_failslab+0x9/0x14 [ 769.105232] __kmalloc+0x2dc/0x740 [ 769.108780] ? strncpy_from_user+0x4e0/0x4e0 [ 769.113196] ? fput+0x128/0x1a0 [ 769.116492] ? do_syscall_64+0x8c/0x800 [ 769.120502] ? __x64_sys_memfd_create+0x13c/0x4b0 [ 769.125359] __x64_sys_memfd_create+0x13c/0x4b0 [ 769.130038] ? memfd_fcntl+0x1870/0x1870 [ 769.134106] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 769.138874] do_syscall_64+0x1a3/0x800 [ 769.142772] ? syscall_return_slowpath+0x5f0/0x5f0 [ 769.147712] ? prepare_exit_to_usermode+0x232/0x3b0 [ 769.152752] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 769.157610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 769.162818] RIP: 0033:0x457ec9 [ 769.166017] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 769.184917] RSP: 002b:00007f4b7e9b9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 769.192624] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457ec9 [ 769.199892] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004bce80 [ 769.207165] RBP: 000000000073bf00 R08: 00000000200000d8 R09: 00000000fbad8001 [ 769.214551] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f4b7e9ba6d4 [ 769.221927] R13: 00000000004c65c3 R14: 00000000004db8a0 R15: 0000000000000003 [ 769.229504] protocol 88fb is buggy, dev hsr_slave_0 00:32:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4700000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:56 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:32:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 769.860425] FAULT_INJECTION: forcing a failure. [ 769.860425] name failslab, interval 1, probability 0, space 0, times 0 [ 770.105050] CPU: 0 PID: 19924 Comm: syz-executor0 Not tainted 5.0.0-rc2+ #29 [ 770.112294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.121649] Call Trace: [ 770.124257] dump_stack+0x1db/0x2d0 [ 770.127891] ? dump_stack_print_info.cold+0x20/0x20 [ 770.132910] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 770.138201] ? print_usage_bug+0xd0/0xd0 [ 770.142274] should_fail.cold+0xa/0x15 [ 770.146184] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 770.151308] ? ___might_sleep+0x1e7/0x310 [ 770.155456] ? arch_local_save_flags+0x50/0x50 [ 770.160044] __should_failslab+0x121/0x190 [ 770.164284] should_failslab+0x9/0x14 [ 770.168089] kmem_cache_alloc+0x2be/0x710 [ 770.172249] ? shmem_destroy_callback+0xc0/0xc0 [ 770.176924] shmem_alloc_inode+0x1c/0x50 [ 770.180991] alloc_inode+0x66/0x190 [ 770.184629] new_inode_pseudo+0x71/0x1b0 [ 770.188701] ? prune_icache_sb+0x1c0/0x1c0 [ 770.192945] ? _raw_spin_unlock+0x2d/0x50 [ 770.197098] new_inode+0x1f/0x40 [ 770.200465] shmem_get_inode+0xe1/0x8d0 [ 770.204455] ? shmem_encode_fh+0x340/0x340 [ 770.208689] ? lock_downgrade+0x910/0x910 [ 770.212841] ? lock_release+0xc40/0xc40 [ 770.216819] ? __check_object_size+0xa3/0x790 [ 770.221326] __shmem_file_setup.part.0+0x7e/0x2b0 [ 770.226184] shmem_file_setup+0x66/0x90 [ 770.230178] __x64_sys_memfd_create+0x2a2/0x4b0 [ 770.234847] ? memfd_fcntl+0x1870/0x1870 [ 770.238911] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 770.243694] do_syscall_64+0x1a3/0x800 [ 770.247592] ? syscall_return_slowpath+0x5f0/0x5f0 [ 770.252522] ? prepare_exit_to_usermode+0x232/0x3b0 [ 770.257549] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.262405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.267638] RIP: 0033:0x457ec9 [ 770.270829] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 770.289725] RSP: 002b:00007f4b7e9b9a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 770.297440] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457ec9 [ 770.304709] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004bce80 [ 770.311976] RBP: 000000000073bf00 R08: 00000000200000d8 R09: 00000000fbad8001 [ 770.319243] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f4b7e9ba6d4 [ 770.326509] R13: 00000000004c65c3 R14: 00000000004db8a0 R15: 0000000000000003 00:32:58 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, 0x0, 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:58 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(0x0, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:32:58 executing program 1 (fault-call:5 fault-nth:0): epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:32:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:32:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='%trfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 772.405148] net_ratelimit: 13 callbacks suppressed [ 772.405213] protocol 88fb is buggy, dev hsr_slave_0 [ 772.415882] protocol 88fb is buggy, dev hsr_slave_1 [ 772.491192] protocol 88fb is buggy, dev hsr_slave_0 [ 772.496842] protocol 88fb is buggy, dev hsr_slave_1 [ 772.513989] input: syz1 as /devices/virtual/input/input28 00:32:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:32:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:32:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='b%rfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 772.893606] input: syz1 as /devices/virtual/input/input29 [ 773.124933] protocol 88fb is buggy, dev hsr_slave_0 [ 773.130106] protocol 88fb is buggy, dev hsr_slave_1 [ 773.365477] protocol 88fb is buggy, dev hsr_slave_0 [ 773.365522] protocol 88fb is buggy, dev hsr_slave_0 [ 773.371123] protocol 88fb is buggy, dev hsr_slave_1 [ 773.376092] protocol 88fb is buggy, dev hsr_slave_1 00:33:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:01 executing program 3: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(0x0, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) [ 775.212795] FAULT_INJECTION: forcing a failure. [ 775.212795] name fail_futex, interval 1, probability 0, space 0, times 1 [ 775.238089] CPU: 0 PID: 19953 Comm: syz-executor1 Not tainted 5.0.0-rc2+ #29 [ 775.245307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.254666] Call Trace: [ 775.257269] dump_stack+0x1db/0x2d0 [ 775.260914] ? dump_stack_print_info.cold+0x20/0x20 [ 775.265953] should_fail.cold+0xa/0x15 [ 775.269873] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 775.274990] ? trace_hardirqs_on_caller+0xc0/0x310 [ 775.279988] ? ima_match_policy+0xac3/0x1550 [ 775.280006] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 775.289849] ? ima_match_policy+0xac3/0x1550 [ 775.289867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.289885] ? add_lock_to_list.isra.0+0x450/0x450 [ 775.289901] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.289922] get_futex_key+0x1122/0x2050 [ 775.289936] ? print_usage_bug+0xd0/0xd0 [ 775.289960] ? futex_lock_pi_atomic+0x350/0x350 [ 775.322288] ? __lock_acquire+0x572/0x4a30 [ 775.326533] ? check_noncircular+0x20/0x20 [ 775.330778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.335541] ? print_usage_bug+0xd0/0xd0 [ 775.339613] ? lockdep_hardirqs_on+0x415/0x5d0 [ 775.344216] ? retint_kernel+0x2d/0x2d [ 775.348113] ? trace_hardirqs_on_caller+0xc0/0x310 [ 775.353046] ? mark_held_locks+0x100/0x100 [ 775.357286] ? retint_kernel+0x2d/0x2d [ 775.361175] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.365940] ? print_usage_bug+0xd0/0xd0 [ 775.370010] ? __lock_acquire+0x572/0x4a30 [ 775.374256] ? print_usage_bug+0xd0/0xd0 [ 775.378324] ? print_usage_bug+0xd0/0xd0 [ 775.382388] ? __lock_acquire+0x572/0x4a30 [ 775.386643] ? memset+0x32/0x40 [ 775.389937] futex_wait_requeue_pi.constprop.0+0xa04/0x1520 [ 775.395650] ? trace_hardirqs_on_caller+0xc0/0x310 [ 775.400590] ? print_usage_bug+0xd0/0xd0 [ 775.404688] ? futex_requeue+0x2650/0x2650 [ 775.408947] ? mark_held_locks+0xb1/0x100 [ 775.413102] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.417867] ? lockdep_hardirqs_on+0x415/0x5d0 [ 775.422455] ? retint_kernel+0x2d/0x2d [ 775.426371] ? add_lock_to_list.isra.0+0x450/0x450 [ 775.431316] ? get_pid_task+0xd4/0x190 [ 775.435204] ? find_held_lock+0x35/0x120 [ 775.439251] ? get_pid_task+0xd4/0x190 [ 775.443128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.448653] do_futex+0x29c/0x2910 [ 775.452193] ? kasan_check_read+0x11/0x20 [ 775.456329] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 775.461590] ? print_usage_bug+0xd0/0xd0 [ 775.466359] ? rcu_read_unlock_special+0x380/0x380 [ 775.471272] ? mark_held_locks+0xb1/0x100 [ 775.475431] ? exit_robust_list+0x290/0x290 [ 775.479745] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.484515] ? lockdep_hardirqs_on+0x415/0x5d0 [ 775.489101] ? retint_kernel+0x2d/0x2d [ 775.492976] ? trace_hardirqs_on_caller+0xc0/0x310 [ 775.497895] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.502640] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 775.508080] ? kasan_check_write+0x14/0x20 [ 775.512309] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.517066] ? lockdep_hardirqs_on+0x415/0x5d0 [ 775.521635] ? retint_kernel+0x2d/0x2d [ 775.525609] ? trace_hardirqs_on_caller+0xc0/0x310 [ 775.530526] ? retint_kernel+0x2d/0x2d [ 775.534400] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.539150] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 775.544592] ? __mutex_unlock_slowpath+0x195/0x870 [ 775.549512] __x64_sys_futex+0x459/0x670 [ 775.553564] ? do_futex+0x2910/0x2910 [ 775.557363] do_syscall_64+0x1a3/0x800 [ 775.561239] ? syscall_return_slowpath+0x5f0/0x5f0 [ 775.566164] ? prepare_exit_to_usermode+0x232/0x3b0 [ 775.571179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.576023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.581297] RIP: 0033:0x457ec9 [ 775.584485] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.603387] RSP: 002b:00007f29124cfc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 775.611100] RAX: ffffffffffffffda RBX: 00007f29124cfc90 RCX: 0000000000457ec9 [ 775.618358] RDX: 0000000000000004 RSI: 000080000000000b RDI: 000000002000cffc [ 775.625613] RBP: 000000000073bf00 R08: 0000000020048000 R09: 0000000000000000 [ 775.632872] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29124d06d4 [ 775.640130] R13: 00000000004be756 R14: 00000000004cf090 R15: 0000000000000004 00:33:02 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:33:02 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:33:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btr.s\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 775.836092] input: syz1 as /devices/virtual/input/input30 00:33:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:33:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4700}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btr/s\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 776.215775] input: syz1 as /devices/virtual/input/input31 00:33:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:33:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrf#\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 776.547228] input: syz1 as /devices/virtual/input/input32 [ 777.526180] net_ratelimit: 16 callbacks suppressed [ 777.526212] protocol 88fb is buggy, dev hsr_slave_0 [ 777.537244] protocol 88fb is buggy, dev hsr_slave_1 [ 777.685761] protocol 88fb is buggy, dev hsr_slave_0 [ 777.691453] protocol 88fb is buggy, dev hsr_slave_1 [ 778.645929] protocol 88fb is buggy, dev hsr_slave_0 [ 778.651837] protocol 88fb is buggy, dev hsr_slave_1 00:33:05 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 778.725720] protocol 88fb is buggy, dev hsr_slave_0 [ 778.731459] protocol 88fb is buggy, dev hsr_slave_1 [ 778.842421] FAULT_INJECTION: forcing a failure. [ 778.842421] name failslab, interval 1, probability 0, space 0, times 0 [ 778.875315] CPU: 1 PID: 20062 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 778.882549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.891904] Call Trace: [ 778.894503] dump_stack+0x1db/0x2d0 [ 778.898140] ? dump_stack_print_info.cold+0x20/0x20 [ 778.903175] should_fail.cold+0xa/0x15 [ 778.907072] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 778.912229] ? ___might_sleep+0x1e7/0x310 [ 778.916382] ? arch_local_save_flags+0x50/0x50 [ 778.920980] __should_failslab+0x121/0x190 [ 778.925222] should_failslab+0x9/0x14 [ 778.929033] __kmalloc+0x2dc/0x740 [ 778.932576] ? strncpy_from_user+0x4e0/0x4e0 [ 778.936993] ? fput+0x128/0x1a0 [ 778.940277] ? do_syscall_64+0x8c/0x800 [ 778.944253] ? __x64_sys_memfd_create+0x13c/0x4b0 [ 778.949101] __x64_sys_memfd_create+0x13c/0x4b0 [ 778.953771] ? memfd_fcntl+0x1870/0x1870 [ 778.957859] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 778.962634] do_syscall_64+0x1a3/0x800 [ 778.966531] ? syscall_return_slowpath+0x5f0/0x5f0 [ 778.971465] ? prepare_exit_to_usermode+0x232/0x3b0 [ 778.976491] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 778.981346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.986537] RIP: 0033:0x457ec9 [ 778.989729] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 779.008635] RSP: 002b:00007f5e8b20da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 779.016342] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457ec9 [ 779.023611] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004bce80 [ 779.030885] RBP: 000000000073bf00 R08: 00000000200000d8 R09: 00000000fbad8001 00:33:05 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x1010, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) r0 = request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='/dev/dsp\x00', 0xfffffffffffffff8) keyctl$assume_authority(0x10, r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x42042, 0x0) write$FUSE_IOCTL(r1, &(0x7f00000000c0)={0x20, 0x0, 0x5, {0x5, 0x0, 0x4a, 0x3}}, 0x20) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(r1, 0x40045431, 0x0) 00:33:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 779.038155] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f5e8b20e6d4 [ 779.045425] R13: 00000000004c65c3 R14: 00000000004db8a0 R15: 0000000000000003 00:33:05 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:33:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:33:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrf%\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:05 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 779.239717] FAULT_INJECTION: forcing a failure. [ 779.239717] name failslab, interval 1, probability 0, space 0, times 0 [ 779.255010] CPU: 0 PID: 20075 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 779.262236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.271602] Call Trace: [ 779.274200] dump_stack+0x1db/0x2d0 [ 779.277843] ? dump_stack_print_info.cold+0x20/0x20 [ 779.282872] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 779.288160] ? print_usage_bug+0xd0/0xd0 [ 779.292244] should_fail.cold+0xa/0x15 [ 779.296138] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 779.296160] ? ___might_sleep+0x1e7/0x310 [ 779.296175] ? arch_local_save_flags+0x50/0x50 [ 779.296200] __should_failslab+0x121/0x190 [ 779.296215] should_failslab+0x9/0x14 [ 779.296230] kmem_cache_alloc+0x2be/0x710 [ 779.305465] ? shmem_destroy_callback+0xc0/0xc0 [ 779.305481] shmem_alloc_inode+0x1c/0x50 [ 779.305497] alloc_inode+0x66/0x190 [ 779.305512] new_inode_pseudo+0x71/0x1b0 00:33:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 779.305526] ? prune_icache_sb+0x1c0/0x1c0 [ 779.305547] ? _raw_spin_unlock+0x2d/0x50 [ 779.305577] new_inode+0x1f/0x40 [ 779.305592] shmem_get_inode+0xe1/0x8d0 [ 779.314386] ? shmem_encode_fh+0x340/0x340 [ 779.314407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 779.314431] __shmem_file_setup.part.0+0x7e/0x2b0 [ 779.338846] shmem_file_setup+0x66/0x90 [ 779.338865] __x64_sys_memfd_create+0x2a2/0x4b0 [ 779.338880] ? memfd_fcntl+0x1870/0x1870 [ 779.338897] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 779.338919] do_syscall_64+0x1a3/0x800 [ 779.338934] ? syscall_return_slowpath+0x5f0/0x5f0 [ 779.338950] ? prepare_exit_to_usermode+0x232/0x3b0 [ 779.351783] input: syz1 as /devices/virtual/input/input33 [ 779.354653] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 779.354680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.354693] RIP: 0033:0x457ec9 [ 779.354707] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 779.354716] RSP: 002b:00007f5e8b20da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 779.354730] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457ec9 [ 779.354740] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004bce80 [ 779.363697] RBP: 000000000073bf00 R08: 00000000200000d8 R09: 00000000fbad8001 [ 779.363707] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f5e8b20e6d4 [ 779.363717] R13: 00000000004c65c3 R14: 00000000004db8a0 R15: 0000000000000003 [ 779.368801] protocol 88fb is buggy, dev hsr_slave_0 00:33:05 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 779.377699] protocol 88fb is buggy, dev hsr_slave_1 00:33:05 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 779.637787] FAULT_INJECTION: forcing a failure. [ 779.637787] name failslab, interval 1, probability 0, space 0, times 0 00:33:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 779.715237] input: syz1 as /devices/virtual/input/input34 [ 779.735912] CPU: 0 PID: 20097 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 779.743143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.752517] Call Trace: [ 779.755112] dump_stack+0x1db/0x2d0 [ 779.758731] ? dump_stack_print_info.cold+0x20/0x20 [ 779.763736] ? kernel_text_address+0x73/0xf0 [ 779.768141] should_fail.cold+0xa/0x15 [ 779.772023] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 779.777125] ? ___might_sleep+0x1e7/0x310 [ 779.781264] ? save_stack+0xa9/0xd0 [ 779.784889] ? arch_local_save_flags+0x50/0x50 [ 779.789459] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 779.794560] ? kasan_slab_alloc+0xf/0x20 [ 779.798607] ? kmem_cache_alloc+0x12d/0x710 [ 779.802915] ? shmem_alloc_inode+0x1c/0x50 [ 779.807138] ? alloc_inode+0x66/0x190 [ 779.810924] ? new_inode_pseudo+0x71/0x1b0 [ 779.815145] ? new_inode+0x1f/0x40 [ 779.818676] __should_failslab+0x121/0x190 [ 779.822914] should_failslab+0x9/0x14 [ 779.826705] kmem_cache_alloc+0x2be/0x710 [ 779.830842] ? lock_downgrade+0x910/0x910 [ 779.834975] ? kasan_check_read+0x11/0x20 [ 779.839184] selinux_inode_alloc_security+0x108/0x3b0 [ 779.844369] ? inode_free_rcu+0x20/0x20 [ 779.848361] ? __put_user_ns+0x70/0x70 [ 779.852240] ? shmem_alloc_inode+0x1c/0x50 [ 779.856499] security_inode_alloc+0x90/0xe0 [ 779.860818] inode_init_always+0x662/0xd30 [ 779.865061] ? get_nr_inodes+0x110/0x110 [ 779.869111] ? rcu_read_lock_sched_held+0x110/0x130 [ 779.874129] alloc_inode+0x83/0x190 [ 779.877745] new_inode_pseudo+0x71/0x1b0 [ 779.881797] ? prune_icache_sb+0x1c0/0x1c0 [ 779.886024] ? _raw_spin_unlock+0x2d/0x50 [ 779.890170] new_inode+0x1f/0x40 [ 779.893537] shmem_get_inode+0xe1/0x8d0 [ 779.897506] ? shmem_encode_fh+0x340/0x340 [ 779.901734] ? lock_downgrade+0x910/0x910 [ 779.905873] ? lock_release+0xc40/0xc40 [ 779.909836] ? __check_object_size+0xa3/0x790 [ 779.914331] __shmem_file_setup.part.0+0x7e/0x2b0 [ 779.919177] shmem_file_setup+0x66/0x90 [ 779.923139] __x64_sys_memfd_create+0x2a2/0x4b0 [ 779.927800] ? memfd_fcntl+0x1870/0x1870 [ 779.931854] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 779.936603] do_syscall_64+0x1a3/0x800 [ 779.940479] ? syscall_return_slowpath+0x5f0/0x5f0 [ 779.945399] ? prepare_exit_to_usermode+0x232/0x3b0 [ 779.950410] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 779.955249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.960444] RIP: 0033:0x457ec9 [ 779.963630] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 779.982535] RSP: 002b:00007f5e8b20da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 779.990549] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457ec9 [ 779.997817] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004bce80 [ 780.005075] RBP: 000000000073bf00 R08: 00000000200000d8 R09: 00000000fbad8001 [ 780.012332] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f5e8b20e6d4 [ 780.019588] R13: 00000000004c65c3 R14: 00000000004db8a0 R15: 0000000000000003 00:33:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrf*\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:06 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0xbeb, 0x20, 0x3, 0x2}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x6}, &(0x7f0000000180)=0x8) 00:33:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:08 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:33:08 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrf+\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:08 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:33:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 782.341161] input: syz1 as /devices/virtual/input/input35 [ 782.367286] FAULT_INJECTION: forcing a failure. [ 782.367286] name failslab, interval 1, probability 0, space 0, times 0 [ 782.449623] CPU: 0 PID: 20141 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 782.456962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.466324] Call Trace: [ 782.468936] dump_stack+0x1db/0x2d0 [ 782.472582] ? dump_stack_print_info.cold+0x20/0x20 [ 782.477616] should_fail.cold+0xa/0x15 [ 782.481497] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 782.486595] ? ___might_sleep+0x1e7/0x310 [ 782.490735] ? arch_local_save_flags+0x50/0x50 [ 782.495305] ? lockdep_init_map+0x10c/0x5b0 [ 782.499618] __should_failslab+0x121/0x190 [ 782.503846] should_failslab+0x9/0x14 [ 782.507638] kmem_cache_alloc+0x2be/0x710 [ 782.511780] ? kasan_check_read+0x11/0x20 [ 782.515921] __d_alloc+0xae/0xbe0 [ 782.519374] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 782.524388] ? _raw_spin_unlock+0x2d/0x50 [ 782.528537] ? inode_sb_list_add+0x223/0x310 [ 782.532937] ? current_time+0x104/0x1b0 [ 782.536901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.542426] ? lockdep_init_map+0x10c/0x5b0 [ 782.546741] d_alloc_pseudo+0x1e/0x30 [ 782.550534] alloc_file_pseudo+0x14f/0x3b0 [ 782.554755] ? alloc_file+0x4d0/0x4d0 [ 782.558543] ? __check_object_size+0xa3/0x790 [ 782.563601] ? kasan_check_write+0x14/0x20 [ 782.567830] __shmem_file_setup.part.0+0x108/0x2b0 [ 782.572753] shmem_file_setup+0x66/0x90 [ 782.576717] __x64_sys_memfd_create+0x2a2/0x4b0 [ 782.581383] ? memfd_fcntl+0x1870/0x1870 [ 782.585433] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 782.590176] do_syscall_64+0x1a3/0x800 [ 782.594069] ? syscall_return_slowpath+0x5f0/0x5f0 [ 782.599002] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 782.604022] ? __switch_to_asm+0x34/0x70 [ 782.608073] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.612909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.618084] RIP: 0033:0x457ec9 [ 782.621262] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 782.640163] RSP: 002b:00007f5e8b20da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 782.647857] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457ec9 [ 782.655125] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004bce80 [ 782.662466] RBP: 000000000073bf00 R08: 00000000200000d8 R09: 00000000fbad8001 [ 782.669736] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f5e8b20e6d4 [ 782.676990] R13: 00000000004c65c3 R14: 00000000004db8a0 R15: 0000000000000005 00:33:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:09 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:33:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrf-\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:09 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 782.807099] net_ratelimit: 14 callbacks suppressed [ 782.807110] protocol 88fb is buggy, dev hsr_slave_0 [ 782.817411] protocol 88fb is buggy, dev hsr_slave_1 [ 782.873449] input: syz1 as /devices/virtual/input/input36 [ 782.894972] protocol 88fb is buggy, dev hsr_slave_0 [ 782.900115] protocol 88fb is buggy, dev hsr_slave_1 [ 782.915602] FAULT_INJECTION: forcing a failure. [ 782.915602] name failslab, interval 1, probability 0, space 0, times 0 [ 782.985767] CPU: 1 PID: 20170 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 782.993004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.002369] Call Trace: [ 783.004974] dump_stack+0x1db/0x2d0 [ 783.008619] ? dump_stack_print_info.cold+0x20/0x20 [ 783.013647] ? add_lock_to_list.isra.0+0x450/0x450 [ 783.018595] should_fail.cold+0xa/0x15 [ 783.022496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 783.027614] ? ___might_sleep+0x1e7/0x310 [ 783.031770] ? arch_local_save_flags+0x50/0x50 [ 783.036373] __should_failslab+0x121/0x190 [ 783.040618] should_failslab+0x9/0x14 [ 783.044435] kmem_cache_alloc+0x2be/0x710 [ 783.048594] ? d_instantiate+0x7b/0xa0 [ 783.052485] ? find_held_lock+0x35/0x120 [ 783.056555] __alloc_file+0x93/0x480 [ 783.060281] ? file_free_rcu+0xe0/0xe0 [ 783.064177] ? kasan_check_read+0x11/0x20 [ 783.068337] ? do_raw_spin_unlock+0xa0/0x330 [ 783.072751] ? do_raw_spin_trylock+0x270/0x270 [ 783.077349] alloc_empty_file+0x72/0x170 [ 783.081439] alloc_file+0x5e/0x4d0 [ 783.084991] alloc_file_pseudo+0x24a/0x3b0 [ 783.089236] ? alloc_file+0x4d0/0x4d0 [ 783.093044] ? __check_object_size+0xa3/0x790 [ 783.097549] ? kasan_check_write+0x14/0x20 [ 783.101798] __shmem_file_setup.part.0+0x108/0x2b0 [ 783.106757] shmem_file_setup+0x66/0x90 [ 783.110754] __x64_sys_memfd_create+0x2a2/0x4b0 [ 783.115433] ? memfd_fcntl+0x1870/0x1870 [ 783.119506] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 783.124273] do_syscall_64+0x1a3/0x800 [ 783.128166] ? syscall_return_slowpath+0x5f0/0x5f0 [ 783.133112] ? prepare_exit_to_usermode+0x232/0x3b0 [ 783.138136] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 783.142992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.148179] RIP: 0033:0x457ec9 [ 783.151390] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 783.170465] RSP: 002b:00007f5e8b20da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 783.178178] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457ec9 [ 783.185451] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004bce80 [ 783.192728] RBP: 000000000073bf00 R08: 00000000200000d8 R09: 00000000fbad8001 [ 783.200179] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f5e8b20e6d4 [ 783.207452] R13: 00000000004c65c3 R14: 00000000004db8a0 R15: 0000000000000003 00:33:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:09 executing program 1: r0 = epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000003c40)='/dev/input/mouse#\x00', 0x9, 0x400) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000003c80)) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000)=0x1, 0x0) recvmmsg(r0, &(0x7f0000003880)=[{{&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/99, 0x63}, {&(0x7f00000001c0)=""/218, 0xda}, {&(0x7f00000002c0)=""/109, 0x6d}], 0x3, &(0x7f0000000340)=""/241, 0xf1}, 0x330}, {{&(0x7f0000000440)=@nl, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000500)=""/239, 0xef}, 0x3}, {{&(0x7f0000000600)=@sco, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/24, 0x18}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/166, 0xa6}, {&(0x7f0000000780)=""/79, 0x4f}], 0x4, &(0x7f0000000840)=""/182, 0xb6}, 0x8}, {{&(0x7f0000000900)=@ax25={{0x3, @netrom}, [@null, @null, @remote, @default, @bcast, @default, @remote, @netrom]}, 0x80, &(0x7f0000000980)=[{&(0x7f0000001a40)=""/139, 0x8b}], 0x1}, 0xfffffffffffffffc}, {{&(0x7f0000001b00)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000001b80)=[{&(0x7f00000009c0)=""/22, 0x16}], 0x1, &(0x7f0000001bc0)=""/209, 0xd1}, 0x81}, {{&(0x7f0000001cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000033c0)=[{&(0x7f0000001d40)=""/253, 0xfd}, {&(0x7f0000001e40)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/157, 0x9d}, {&(0x7f0000002f00)=""/243, 0xf3}, {&(0x7f0000003000)=""/214, 0xd6}, {&(0x7f0000003100)=""/253, 0xfd}, {&(0x7f0000003200)=""/49, 0x31}, {&(0x7f0000003240)=""/69, 0x45}, {&(0x7f00000032c0)=""/193, 0xc1}], 0x9, &(0x7f0000003480)=""/92, 0x5c}, 0x3c}, {{&(0x7f0000003500)=@can, 0x80, &(0x7f0000003740)=[{&(0x7f0000003580)=""/185, 0xb9}, {&(0x7f0000003640)=""/252, 0xfc}], 0x2, &(0x7f0000003780)=""/203, 0xcb}, 0x1ff}], 0x7, 0x20, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cpu.stat\x00', 0x0, 0x0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000003a40)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003b00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000003c00)={&(0x7f0000003ac0)={0x10, 0x0, 0x0, 0x44c001}, 0xc, &(0x7f0000003bc0)={&(0x7f0000003b40)={0x58, r4, 0x328, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1ff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x963b}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20040890}, 0x810) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4000, 0x2, &(0x7f0000425000/0x4000)=nil) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r2, 0x40086610, &(0x7f0000003a80)=0x531) 00:33:09 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 783.406667] input: syz1 as /devices/virtual/input/input37 [ 783.524988] protocol 88fb is buggy, dev hsr_slave_0 [ 783.530162] protocol 88fb is buggy, dev hsr_slave_1 [ 783.766087] protocol 88fb is buggy, dev hsr_slave_0 [ 783.771834] protocol 88fb is buggy, dev hsr_slave_1 [ 784.165357] protocol 88fb is buggy, dev hsr_slave_0 [ 784.171003] protocol 88fb is buggy, dev hsr_slave_1 00:33:11 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:33:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrf.\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:33:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4700000000000000}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:11 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 785.250840] FAULT_INJECTION: forcing a failure. [ 785.250840] name failslab, interval 1, probability 0, space 0, times 0 [ 785.274759] input: syz1 as /devices/virtual/input/input38 [ 785.325860] CPU: 1 PID: 20203 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 785.333078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.342421] Call Trace: [ 785.345006] dump_stack+0x1db/0x2d0 [ 785.348627] ? dump_stack_print_info.cold+0x20/0x20 [ 785.353629] ? __alloc_file+0x93/0x480 [ 785.357509] ? alloc_empty_file+0x72/0x170 [ 785.361730] ? alloc_file+0x5e/0x4d0 [ 785.365429] ? alloc_file_pseudo+0x24a/0x3b0 [ 785.369824] ? __shmem_file_setup.part.0+0x108/0x2b0 [ 785.374914] ? __x64_sys_memfd_create+0x2a2/0x4b0 [ 785.379748] should_fail.cold+0xa/0x15 [ 785.383624] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 785.388721] ? ___might_sleep+0x1e7/0x310 [ 785.392858] ? arch_local_save_flags+0x50/0x50 [ 785.397432] ? check_preemption_disabled+0x48/0x290 [ 785.402441] __should_failslab+0x121/0x190 [ 785.406666] should_failslab+0x9/0x14 [ 785.410457] kmem_cache_alloc+0x2be/0x710 [ 785.414591] ? __alloc_file+0x93/0x480 [ 785.418467] ? __alloc_file+0x93/0x480 [ 785.422341] ? rcu_read_lock_sched_held+0x110/0x130 [ 785.427351] selinux_file_alloc_security+0xb4/0x190 [ 785.432357] security_file_alloc+0x69/0xb0 [ 785.436582] __alloc_file+0x128/0x480 [ 785.440370] ? file_free_rcu+0xe0/0xe0 [ 785.444269] ? kasan_check_read+0x11/0x20 [ 785.448404] ? do_raw_spin_unlock+0xa0/0x330 [ 785.452815] ? do_raw_spin_trylock+0x270/0x270 [ 785.457387] alloc_empty_file+0x72/0x170 [ 785.461442] alloc_file+0x5e/0x4d0 [ 785.464976] alloc_file_pseudo+0x24a/0x3b0 [ 785.469206] ? alloc_file+0x4d0/0x4d0 [ 785.472993] ? __check_object_size+0xa3/0x790 [ 785.477494] ? kasan_check_write+0x14/0x20 [ 785.481720] __shmem_file_setup.part.0+0x108/0x2b0 [ 785.486644] shmem_file_setup+0x66/0x90 [ 785.490612] __x64_sys_memfd_create+0x2a2/0x4b0 [ 785.495271] ? memfd_fcntl+0x1870/0x1870 [ 785.499323] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 785.504073] do_syscall_64+0x1a3/0x800 [ 785.507953] ? syscall_return_slowpath+0x5f0/0x5f0 [ 785.512869] ? prepare_exit_to_usermode+0x232/0x3b0 [ 785.517875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 785.522711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.527884] RIP: 0033:0x457ec9 [ 785.531067] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 785.549952] RSP: 002b:00007f5e8b20da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 785.557661] RAX: ffffffffffffffda RBX: 00000000200000c0 RCX: 0000000000457ec9 [ 785.564935] RDX: 00000000200000d8 RSI: 0000000000000000 RDI: 00000000004bce80 00:33:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 785.572202] RBP: 000000000073bf00 R08: 00000000200000d8 R09: 00000000fbad8001 [ 785.579456] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f5e8b20e6d4 [ 785.586712] R13: 00000000004c65c3 R14: 00000000004db8a0 R15: 0000000000000003 00:33:12 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:33:12 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrf0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 785.816372] input: syz1 as /devices/virtual/input/input39 [ 786.084879] FAULT_INJECTION: forcing a failure. [ 786.084879] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 786.190980] CPU: 0 PID: 20241 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 786.198212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.198229] Call Trace: [ 786.198250] dump_stack+0x1db/0x2d0 [ 786.198271] ? dump_stack_print_info.cold+0x20/0x20 [ 786.198288] ? print_usage_bug+0xd0/0xd0 [ 786.198311] should_fail.cold+0xa/0x15 [ 786.198331] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 786.198353] ? arch_local_save_flags+0x50/0x50 [ 786.198365] ? lock_release+0xc40/0xc40 [ 786.198392] should_fail_alloc_page+0x50/0x60 [ 786.236511] __alloc_pages_nodemask+0x323/0xdc0 [ 786.236531] ? rcu_read_unlock_special+0x380/0x380 [ 786.236550] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 786.236579] ? mpol_shared_policy_lookup+0xf7/0x150 [ 786.236598] ? shmem_pseudo_vma_init+0x18d/0x2a0 [ 786.236613] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 786.236627] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 786.280453] alloc_pages_vma+0xdd/0x540 [ 786.284440] shmem_alloc_page+0xc0/0x1b0 [ 786.288504] ? shmem_swapin+0x230/0x230 [ 786.292503] ? cap_capable+0x205/0x270 [ 786.296417] shmem_alloc_and_acct_page+0x218/0xd90 [ 786.301355] ? shmem_getattr+0x2c0/0x2c0 [ 786.305429] ? __lock_acquire+0x572/0x4a30 [ 786.309665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.315215] ? __lock_acquire+0x572/0x4a30 [ 786.319453] ? lock_downgrade+0x910/0x910 [ 786.323617] shmem_getpage_gfp+0x68d/0x4b70 [ 786.327962] ? shmem_add_to_page_cache+0x19a0/0x19a0 [ 786.333073] ? __lock_acquire+0x572/0x4a30 [ 786.337331] ? mark_held_locks+0x100/0x100 [ 786.341599] ? __lock_acquire+0x572/0x4a30 [ 786.345846] ? mark_held_locks+0x100/0x100 [ 786.350084] ? print_usage_bug+0xd0/0xd0 [ 786.354169] ? add_lock_to_list.isra.0+0x450/0x450 [ 786.359099] ? __lock_acquire+0x572/0x4a30 [ 786.363355] ? print_usage_bug+0xd0/0xd0 [ 786.367419] ? __lock_acquire+0x572/0x4a30 [ 786.371660] ? simple_xattr_get+0x109/0x180 [ 786.375986] ? add_lock_to_list.isra.0+0x450/0x450 [ 786.380923] ? simple_xattr_get+0x109/0x180 [ 786.385247] ? print_usage_bug+0xd0/0xd0 [ 786.389311] ? lock_acquire+0x1db/0x570 [ 786.393293] ? current_time+0x6e/0x1b0 [ 786.397185] ? find_held_lock+0x35/0x120 [ 786.401253] ? mark_held_locks+0xb1/0x100 [ 786.405407] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 786.410603] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 786.415801] ? lockdep_hardirqs_on+0x415/0x5d0 [ 786.420387] ? trace_hardirqs_on+0xbd/0x310 [ 786.424710] ? current_time+0x6e/0x1b0 [ 786.428627] ? trace_hardirqs_off_caller+0x300/0x300 [ 786.433747] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 786.438769] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 786.444367] ? iov_iter_fault_in_readable+0x22c/0x450 [ 786.449570] shmem_write_begin+0x105/0x1e0 [ 786.453852] generic_perform_write+0x2a0/0x6b0 [ 786.458455] ? add_page_wait_queue+0x480/0x480 [ 786.463044] ? current_time+0x1b0/0x1b0 [ 786.467028] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 786.472052] ? generic_write_check_limits+0x291/0x380 [ 786.477256] __generic_file_write_iter+0x25e/0x630 [ 786.482191] ? rcu_read_unlock_special+0x380/0x380 [ 786.487143] generic_file_write_iter+0x34e/0x6a0 [ 786.491896] ? __generic_file_write_iter+0x630/0x630 [ 786.496988] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 786.502520] ? iov_iter_init+0xea/0x220 [ 786.506488] __vfs_write+0x764/0xb40 [ 786.510212] ? kernel_read+0x120/0x120 [ 786.514128] ? rcu_read_lock_sched_held+0x110/0x130 [ 786.519132] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 786.523879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.529401] ? __sb_start_write+0x1ac/0x360 [ 786.533718] vfs_write+0x20c/0x580 [ 786.537254] ksys_pwrite64+0x183/0x1c0 [ 786.541156] ? __ia32_sys_pread64+0xf0/0xf0 [ 786.545468] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 786.550994] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.556347] ? trace_hardirqs_off_caller+0x300/0x300 [ 786.561453] __x64_sys_pwrite64+0x97/0xf0 [ 786.566057] do_syscall_64+0x1a3/0x800 [ 786.569937] ? syscall_return_slowpath+0x5f0/0x5f0 [ 786.574858] ? prepare_exit_to_usermode+0x232/0x3b0 [ 786.579869] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 786.584719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.589892] RIP: 0033:0x411ed7 [ 786.593076] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 786.611977] RSP: 002b:00007f5e8b20da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 786.619673] RAX: ffffffffffffffda RBX: 00000000200000d0 RCX: 0000000000411ed7 [ 786.626945] RDX: 00000000000000ca RSI: 0000000020000640 RDI: 0000000000000004 [ 786.634200] RBP: 0000000000000000 R08: 00000000200000d8 R09: 00000000fbad8001 [ 786.641454] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 786.648711] R13: 0000000000000001 R14: 00000000004db8a0 R15: 0000000000000003 00:33:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:13 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x100000001802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) [ 787.926281] net_ratelimit: 16 callbacks suppressed [ 787.926365] protocol 88fb is buggy, dev hsr_slave_0 [ 787.936993] protocol 88fb is buggy, dev hsr_slave_1 00:33:14 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:33:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfX\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:14 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:14 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x1, 0x8, 0x1f, 0x0}, &(0x7f0000000400)=0x10) sendmmsg$inet_sctp(r0, &(0x7f0000000500)=[{&(0x7f0000000280)=@in={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000380)=[{&(0x7f00000002c0)="03753f1f0b269425ce61c3e73c4b1a21af84ffa242026787b6db88de1e2fa9b4573b5e0710352a7061cbc10a56b7e7bf4a610eeaa9cd0f15ec86c1b960a3af113372a5c508658c2b6e1e375d418423f206c4124f6272549eb1d1ae65fadfa00e33c51f2ec39438ca38e0268af6a022f78b51e632989b8bbca65a665a5ae7160de9bd3bea1bcbd4daf8707154dddda20e61b3a8d524652eeb5e45585d7c22c0970e80bbd13b1653718bb5c72efb5a4ba2df4c3149ad3c3ed48599e124db", 0xbd}], 0x1, &(0x7f0000000440)=[@sndrcv={0x30, 0x84, 0x1, {0x6, 0x6, 0x2, 0x1, 0x7fff, 0xffffffff, 0x9dd, 0xab, r1}}, @init={0x18, 0x84, 0x0, {0x36cd0a7a, 0xf7, 0x81, 0x7f}}, @init={0x18, 0x84, 0x0, {0x81, 0x0, 0x4, 0xffffffffffffffb9}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="2eeda845fdde67e124577dfb1b52ec90"}, @init={0x18, 0x84, 0x0, {0x6, 0x5f7000, 0x9, 0x8}}, @authinfo={0x18, 0x84, 0x6, {0x3}}], 0xb0, 0x40000}], 0x1, 0x4000001) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f00000000c0)='ppp0\x00', 0x5) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x8d3d}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r3, 0x2c8, 0xb5}, &(0x7f00000001c0)=0xc) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x3ff, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x3d, 0x6}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) 00:33:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 788.442251] FAULT_INJECTION: forcing a failure. [ 788.442251] name failslab, interval 1, probability 0, space 0, times 0 [ 788.453986] CPU: 1 PID: 20277 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 788.461180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.470535] Call Trace: [ 788.473137] dump_stack+0x1db/0x2d0 [ 788.476777] ? dump_stack_print_info.cold+0x20/0x20 [ 788.481816] should_fail.cold+0xa/0x15 [ 788.485718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 788.490829] ? print_usage_bug+0xd0/0xd0 [ 788.494884] ? __lock_acquire+0x572/0x4a30 [ 788.499110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.504641] __should_failslab+0x121/0x190 [ 788.508867] should_failslab+0x9/0x14 [ 788.512654] kmem_cache_alloc+0x47/0x710 [ 788.516702] ? add_lock_to_list.isra.0+0x450/0x450 [ 788.521618] ? mark_held_locks+0x100/0x100 [ 788.525842] ? print_usage_bug+0xd0/0xd0 [ 788.529895] xas_alloc+0x39b/0x4d0 [ 788.533425] ? minmax_running_min+0x6b0/0x6b0 [ 788.537917] xas_create+0x39b/0x10c0 [ 788.541630] ? xas_find_conflict+0x880/0x880 [ 788.546023] ? xas_start+0x22c/0x720 [ 788.549739] ? xas_pause+0x490/0x490 [ 788.553437] ? lock_acquire+0x1db/0x570 [ 788.557399] ? shmem_add_to_page_cache+0xa86/0x19a0 [ 788.562403] ? kasan_check_read+0x11/0x20 [ 788.566703] ? do_raw_spin_lock+0x156/0x360 [ 788.571021] xas_create_range+0x193/0x5b0 [ 788.575186] shmem_add_to_page_cache+0xacc/0x19a0 [ 788.580050] ? shmem_writepage+0x1520/0x1520 [ 788.584450] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 788.589728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 788.595258] ? swap_duplicate+0x80/0x80 [ 788.599218] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.604746] ? __lock_acquire+0x572/0x4a30 [ 788.608975] ? lock_downgrade+0x910/0x910 [ 788.613118] shmem_getpage_gfp+0x161a/0x4b70 [ 788.617532] ? shmem_add_to_page_cache+0x19a0/0x19a0 [ 788.622622] ? __lock_acquire+0x572/0x4a30 [ 788.626846] ? mark_held_locks+0x100/0x100 [ 788.631069] ? __lock_acquire+0x572/0x4a30 [ 788.635296] ? mark_held_locks+0x100/0x100 [ 788.639519] ? print_usage_bug+0xd0/0xd0 [ 788.643572] ? add_lock_to_list.isra.0+0x450/0x450 [ 788.648489] ? __lock_acquire+0x572/0x4a30 [ 788.652709] ? print_usage_bug+0xd0/0xd0 [ 788.656761] ? __lock_acquire+0x572/0x4a30 [ 788.661017] ? simple_xattr_get+0x109/0x180 [ 788.665344] ? add_lock_to_list.isra.0+0x450/0x450 [ 788.670264] ? simple_xattr_get+0x109/0x180 [ 788.674662] ? print_usage_bug+0xd0/0xd0 [ 788.679033] ? lock_acquire+0x1db/0x570 [ 788.683012] ? current_time+0x6e/0x1b0 [ 788.686887] ? find_held_lock+0x35/0x120 [ 788.690941] ? mark_held_locks+0xb1/0x100 [ 788.695088] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 788.700265] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 788.705443] ? lockdep_hardirqs_on+0x415/0x5d0 [ 788.710015] ? trace_hardirqs_on+0xbd/0x310 [ 788.714322] ? current_time+0x6e/0x1b0 [ 788.718200] ? trace_hardirqs_off_caller+0x300/0x300 [ 788.723299] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 788.728299] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 788.733827] ? iov_iter_fault_in_readable+0x22c/0x450 [ 788.739012] shmem_write_begin+0x105/0x1e0 [ 788.743236] generic_perform_write+0x2a0/0x6b0 [ 788.747817] ? add_page_wait_queue+0x480/0x480 [ 788.752383] ? current_time+0x1b0/0x1b0 [ 788.756346] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 788.761348] ? generic_write_check_limits+0x291/0x380 [ 788.766530] __generic_file_write_iter+0x25e/0x630 [ 788.771466] ? rcu_read_unlock_special+0x380/0x380 [ 788.776387] generic_file_write_iter+0x34e/0x6a0 [ 788.781138] ? __generic_file_write_iter+0x630/0x630 [ 788.786229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 788.791755] ? iov_iter_init+0xea/0x220 [ 788.795719] __vfs_write+0x764/0xb40 [ 788.799422] ? kernel_read+0x120/0x120 [ 788.803305] ? rcu_read_lock_sched_held+0x110/0x130 [ 788.808310] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 788.813055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.818577] ? __sb_start_write+0x1ac/0x360 [ 788.822891] vfs_write+0x20c/0x580 [ 788.826424] ksys_pwrite64+0x183/0x1c0 [ 788.830299] ? __ia32_sys_pread64+0xf0/0xf0 [ 788.834605] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 788.840148] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 788.845501] ? trace_hardirqs_off_caller+0x300/0x300 [ 788.850598] __x64_sys_pwrite64+0x97/0xf0 [ 788.854739] do_syscall_64+0x1a3/0x800 [ 788.858620] ? syscall_return_slowpath+0x5f0/0x5f0 [ 788.863537] ? prepare_exit_to_usermode+0x232/0x3b0 [ 788.868549] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 788.873385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 788.878559] RIP: 0033:0x411ed7 [ 788.881742] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 788.900632] RSP: 002b:00007f5e8b20da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 788.908326] RAX: ffffffffffffffda RBX: 00000000200000d0 RCX: 0000000000411ed7 [ 788.915584] RDX: 00000000000000ca RSI: 0000000020000640 RDI: 0000000000000004 [ 788.922839] RBP: 0000000000000000 R08: 00000000200000d8 R09: 00000000fbad8001 [ 788.930096] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 788.937350] R13: 0000000000000001 R14: 00000000004db8a0 R15: 0000000000000003 [ 788.944953] protocol 88fb is buggy, dev hsr_slave_0 [ 788.950090] protocol 88fb is buggy, dev hsr_slave_1 00:33:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:15 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[{0xd50, 0x0, 0x3, "9aaf2cc09bdc67f8eed4c2159b1cb8aeac3c1b7698d32ed1ab45bbedf27577d1c492ab50d141376d4a7b8fe84479cfa3270107e0982a830fc9212a29589ed5dc4bdbcd92223b849ccc54b83e45d5296bede253583e7e1ead16c12e528b4b8839f8650ca51e6e19faa6122108421bd158c549b2a6a2f8a377f646bf52d9a337fbed4a0057c1d4e5071d52649cb5d492eedfb7a8f9d753549a3ce1d26297465b2163da092aaed5688303abb3f482b528496f4b173c77dcb9d2e44ededb29395b65fb739c1094925d49623068cd97f6c41db4ea493a883e5494a60445fa9448ec28b4b9f7e5400c2f3e58484c48f7f9966abe8865ef48d760a7cf32489a2984c2947b338f9a81d600dec0163305882ca589952bb925b725bb48acfe27c9a02aa9c8878fc0a35b1d0711e8cd403bedb112ba6e7336b87a4d888f01da82156f62db9535b58a412091d9aed2daf0f9d4866dda4f1787683e2d32109fa2aaadefd98cb433eea0e08751d41673354313c17aa1aa4bc138d6ba725f6c970d37cd9263328071c3fe8e3263381d97a383db445494b820ae3eefb53b63887cc7c63ec0977b4884e5880218818330e78e5ebcdd214ee32f115dfcd602786beb0200036c5665f60471d288ce88aa093f012b0549bafce448c769915bc737139b46b614d2fdd2e890303f592e30e7dd57a8c3cca8514ad8759bb96cf853235ea5d49b34280eed5e604b3cf451dedea3f73561d2da962e6f141c6410d68482cedcd6eb570deed1212ac8a8c4154b82ee97300c44e7453a58a15fdef4e4c7b07d685503778dbe56b67fffad9cfe4016776d911b8775d37f6521d740b6eb2d0338880fcd51dd3781088a7cd72344a52521e461b746c9a88838f04e6439b4b5227f5c2f223689384b653df6120917f1e0aae826f57b4761065a8278a497b8b673023ec1cddb7a1931e093ed40602a39d830dc34060b13e903692bd73ec681372f99f215e0ea07655b46493cb67b6beffd1e7e0d0b421f3eae2a40b717758071ffa150ff5305a881b6ea2f491e2a6640cf5465ffe36be964ecb19f392a17ac83ca24bf2a0b5a130373aeb37ec6674160d6270a59c91eea50575daa7888b3d00bb1c3f1d5108a0b36fc29e2b02cf9a234cde4fe45a3834ed10c860b7402300369e029f2dd2ba08cd36eee1198451e00130608c6b59efa702329153fe5eef5735fe8e5a9b62c440b3768fb99b072c18ceb0cc34ebb15567d83c1173343a18e4900eed21f0c2a5871737010c7b1f2bf57bbc70b4d9c6a10e79bf3bad874af8c57a081e1856a3c65de22f63c100cbac529916445dd2ebaa262e7f481f71b557f8e5d4a77d287e1f6e59f9d3657cbb7c517564ea2ce3529a265a910a608811271eecb5c942bb5da9da552bf20ed3f4549d8b98e9645d3da97593d39d7986d38d365c9c84b1c2b3da30364ac7096273c43982fb3b2b21de6e87c61e7a2bf107b9c69b9cbc22a0a5c36754f475cce7d00563b7a14f0c41cda5a44081a45f04b4187c0d947692bb459758020b99db64ace3161eb4737d1b5aad3f2d7ace38aca043d722472abdd62eac6085e8189617bd93fd45102df1b0a8906db3aa77c17fec049460fbae899391322444fa4ecdfdc08b7d9ccee86032c50129dabcc126fa5a5d68707392f605013f7ce3e5272b98510adcd6d17ef72a0f2b1395e88181350c2a5f22dc9ec55ab8098dae3ef7efdcf3f9a25b47e2ed889cdab9e6dd78e84bc056c7b3ad6aad1f16cb2dab00e4d9d1a8b2962ce7645ba213121ffacac419892d6fe004cbccd5813af54b18b1dcdc4d9ce630d3df9a57f2337518d06cdd847d4edbd7ac8c8a5c79308ee4ed8a830de768be68b67d84acf354d7c75247a8713e5f281c73b1c64ef182282dbfbf24a8e0f75a8c88f2ead690e2043da6cd259d6e1627ab42c0f0661dc10bdd765855f615032469d494c7c04a681d41760bb2b01e92fa94a8614f3b52b94943cd863892c44f7627d14f4b92e3dbc62f351d6af61e10d0c21baf5e1632eccdce50b9addaab5c4a5ea8d0fffe4ff4b841bf7549157a87b830db553c0a59ee5fee9a25921c886124e91fff018a86a01fe1c9cfa23c29e5d889b14879e3a03e13f1e0f7d9f3f777c5c27424524473c01534ecd6be7c14ca7e2cae3affbb0f7870f44f6e8bc4e5257ff8f649199fc13b5123ca50c15e81a595dc057b5cc2c61191cf02b3d25a4ff9a0513c96a97dbf0356d975e7eb0b2f1e779b2e8fb04ffa9d3f3ce344468c6582fcb3a56d16138cab07bbf15d28bb8c6e3db7290db4bd9a7b224a786dc68801324faaa68dec22448c58d1fbe08456fdcec9c00690b768661ddf6245ebc8aa9023f6a235f76d9108f86d99d571d54d56ecbb73cc57d1f6e88b23d82adee8cfa2f136ef768f1c7970e02bfb491ee24a8aff236ca5c39ec62cec554e29c81b50c30e850d40f956ecb2ea4c138901e701f88cf585e4be78a51bc8c464ec088da00cb563755899a8aca8b157feaea21ed45e54d03636071a6745a34d092a13f246dd1fa744fe1d2219ca2a9c16ecc0efc0d10f84a2c5951e7457cac90f62c2409e427b47e113e868e55fa0cb78ac8bac2e1a96b1540e9733c8847a3101ea5ac1ccb3e1a4a47282db62631cbd39f7b75ddfa9d572f17f7232a74e81f6106dde297658629f1196c365b6e11f8402b755f243d6ed19fc2720ea6552d361365c7efe6bbfac37803d9b3dbacd3de521a9ee6d0709b8307a63fc466f1321262d58fa1ab644b1793476b73e72e8fcb8da95406c56e5ca9c89a076f53a4a8cbd9243af05075daf6908016d83e93e3a3dcb49ec8839e3bd933d6e9034a9a5fc3e1999c1a4bb417eb4d6d520515c70e1e80982470e9bb0dd877f14a6bfeb99668fb8b84c8cca2098b3791736056a5c0de4fc7e63296cce954072aa3a278c081a19263c7eed782205f89491d71fa51467bc82cf14fe6a841b04f9398dcc19237392bc70767fa395d069257860dba788a9bf2dd898d6d697220e42ef723ddadad410fca8838c42f519ce694a9901f3d29fa5b0612f3cbb1bee3ea48cf3862bc872de96c699b0323d774e4682d0aea978b9acd72e477a2d7a3747560feddb38480c7ac865f06ac29a066be5e77a1fd31a1aed277a71a59724727892423b64d8ee1b4721386bd87d89357533078c9949b6935eb982c7f602c6276f6fa8b8d5fa070dac83a71287185dea6fd924dc214da21396038b6f1f0ba80cf2813ea71739d7a4ba12e86b16a18cf7bcfe0e212020cbb561c8d79a9717b95405593ca5fc2256b15c1ec499b3fc6b5392917c0116da76542d92382380e605278bdd530a8c3b7de8dc988b4cb4fb2fe7805d92d23a74ca8b72416e8f5acdf866169f3c82d8215ac5b2d931dadfa3f63e770c60019bf80566eafdcd88545d5289bc940e590d59ce9baf0882a1cd8f2663df529cf5d8e5dc93fb8b1262b7cac8eecb4cedc6a93313a9bb9731e0042e0f2edbc9e8db403e450546628fc3c004a80cf7eb581a115e55003b5b05a3e7fdf9c3841f55a7e255e8621dfe873aafbf6a9321ac63f1e1fc1d27d9bb287133b5befdb7acfad6639337ec2f4662041990d09e64d3d57b4b346ec830ef0d962553bd214179386d1a0026907f5f6354c1fc6c29715d74f36b7aad8957a567eca1f4c7125c06b6c09f3a6c847c960b5cc3a7ba0e810121a0aaccd6b46dc763eceed254b9fe510db4670d2d55e25edf89e875d8a756a50442cdd3eb4a342a9deb497b56abef2dd531ed243f4fc2214c6b37ae3946b12136879d94121e9d276caaf086534b1e4e7b2dfe11c18b1e6e1d711c41aa3b5d08d0690efc597f406bf182064dab321433bdc97e21dcd2c7942008c6ab501d71bb4c16b62b1265f1eef60c06b52e766642746a1df3fe0ac09c8a325f03ec38681102ebd3bac8c6f8e488376cdd26b8e9b47d029b5ab5c9ff07f2a2aebdecf653b78ac61ebbafa2b49536dcd6a3974c844c4de54e555f5befbb60b32d49c625b393a4ad36081b7dc1b7bb4bc25b21d16c78ea0e4d221e0c32da7d6def681c368204cf8cba9638090823b88265119229d7b5ed42ee4cd06cc7e92672e896df574b2d0814ee4eb1e778cac9f63b656d85a554c6347399894d131bc524f302cf6c052bd3c16443d58b5e86cb0057a2f1dbd83d225d5213f84fb0d54aed90f5adef28715907696bfaae13a9bac27c3c293a98ffeb1addc987cbb0aefb4c5ffeb3c1c140c685fad8f79fbbf96f0facbcd9d719d1ccd81ebb820d53cf674a69593edb0a749b71c3ec8f9d03434e47b18567bb8af506ebc1b04ec4421b47400235cbf205d78b1645bf04715130e806d0addcc8c03c92db0463c0e6153458f6d17ea09f27ec566f43a3658aa6e55f48a1270d4a45194b86f31e6a396c48f26afb3cee538dd07adc0a5a49e7b76b4bb1239e65c3d37ceb332fe272674f7a37d22345bff6fdbd2138875d15115bc58f4bc6a5b820c0739a222514df3136ec1f9be2a79edee31a5831af2112e0f27af86729ca152b62cbec730bc0c8522159d38ea811b182ed09ddcd2a38c8560714b229bfe5bfac402625c00486c1ed0cf333934844d38fdf9d42a8eeb913bbf64e9a44c7b6aa92ff9682b3ba2a18c9c0f854a6bde6039af850695a7c30ca2f24c06a67d0bca45d2985a299939567ae0b20c45a895bb0b4b46b5e05e82b2f9f3043ad4d8dbd67e035b39109482281cc058139bea220cb5e740c53490616c9b2c50b306fbbffe516d1ac56746341ae36273127ae5c9d5f756b48051f31cbe"}], 0xd50}, 0x50) [ 789.045221] protocol 88fb is buggy, dev hsr_slave_0 [ 789.050796] protocol 88fb is buggy, dev hsr_slave_1 [ 789.124900] protocol 88fb is buggy, dev hsr_slave_0 [ 789.130026] protocol 88fb is buggy, dev hsr_slave_1 00:33:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfc\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 789.765846] protocol 88fb is buggy, dev hsr_slave_0 [ 789.771438] protocol 88fb is buggy, dev hsr_slave_1 [ 790.907753] BTRFS: device fsid ecf6f2a2-2997-48ae-1f08-00d01424f03c devid 70 transid 12498261560847380539 /dev/loop3 [ 790.924156] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 790.940290] BTRFS error (device loop3): superblock checksum mismatch [ 790.964473] BTRFS error (device loop3): open_ctree failed 00:33:17 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:33:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfd\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:17 executing program 1: epoll_create(0x714) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x800a, 0x0) ftruncate(r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x80000) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000100)={@ipv4={[], [], @multicast1}, 0x5c, r2}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x40000, 0x0) sendmsg$can_bcm(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1d, r2}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0700000000010000f8ffffff00000000", @ANYRES64=0x0, @ANYRES64=0x7530, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0200b42da1d075c91ef2002022020000a3e36753c97a6b0804ad6cbd92426481f04c38de35fda212bfcd495d450e9b06d1599b3bc8dc9bb901d8ffc1d0e2315937335c166f8d0171402293cf5c33f1ae"], 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) 00:33:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 791.706529] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 791.726957] BTRFS error (device loop3): superblock checksum mismatch 00:33:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfi\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 791.775117] BTRFS error (device loop3): open_ctree failed 00:33:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='\ntrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 793.055602] net_ratelimit: 12 callbacks suppressed [ 793.055666] protocol 88fb is buggy, dev hsr_slave_0 [ 793.065927] protocol 88fb is buggy, dev hsr_slave_1 [ 793.215941] protocol 88fb is buggy, dev hsr_slave_0 [ 793.221717] protocol 88fb is buggy, dev hsr_slave_1 [ 793.285683] protocol 88fb is buggy, dev hsr_slave_0 [ 793.291435] protocol 88fb is buggy, dev hsr_slave_1 [ 793.935384] protocol 88fb is buggy, dev hsr_slave_0 [ 793.940798] protocol 88fb is buggy, dev hsr_slave_1 00:33:20 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:33:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfl\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='%trfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 794.164916] protocol 88fb is buggy, dev hsr_slave_0 [ 794.170027] protocol 88fb is buggy, dev hsr_slave_1 00:33:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfo\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='.trfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:22 executing program 1: epoll_create(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000)=0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f00000014c0)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000380)=""/15, 0xf}, {&(0x7f00000003c0)=""/136, 0x88}, {&(0x7f0000000480)=""/161, 0xa1}, {&(0x7f0000000540)=""/222, 0xde}, {&(0x7f0000000640)=""/202, 0xca}, {&(0x7f0000000740)=""/28, 0x1c}], 0x6, &(0x7f0000000800)=""/166, 0xa6}, 0x3}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000008c0)=""/151, 0x97}], 0x1, &(0x7f00000009c0)=""/16, 0x10}, 0x10001}, {{&(0x7f0000000a00)=@alg, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000a80)=""/165, 0xa5}, {&(0x7f0000000b40)=""/159, 0x9f}], 0x2}, 0x1}, {{0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000c40)=""/206, 0xce}, {&(0x7f0000000d40)=""/175, 0xaf}, {&(0x7f0000000e00)=""/210, 0xd2}, {&(0x7f0000000f00)=""/73, 0x49}, {&(0x7f0000000f80)=""/31, 0x1f}], 0x5, &(0x7f0000001040)=""/13, 0xd}, 0x2}, {{&(0x7f0000001080)=@alg, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001100)=""/138, 0x8a}], 0x1}, 0x6}, {{&(0x7f0000001200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001480)=[{&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/195, 0xc3}, {&(0x7f0000001440)=""/19, 0x13}], 0x3}, 0x1}], 0x6, 0x12040, &(0x7f0000001640)={0x77359400}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001880)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001980)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000001a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1b, &(0x7f0000001ac0)={@loopback, 0x0}, &(0x7f0000001b00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b40)={'syz_tun\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001b80)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@remote}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000001cc0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002000)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000002100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002140)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000002240)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000002280)=@hci={0x1f, 0x0}, &(0x7f0000002300)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000027c0)={{{@in6=@ipv4={[], [], @loopback}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f00000028c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002940)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000029c0)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000002ac0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000002b00)={@multicast1, @remote, 0x0}, &(0x7f0000002b40)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002b80)={'vcan0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002c00)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000002c40)={@rand_addr, @empty, 0x0}, &(0x7f0000002c80)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002cc0)={'netdevsim0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002d00)={{{@in=@local, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000002e00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002f40)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000003040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003080)={0x0, @remote, @broadcast}, &(0x7f00000030c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003200)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000003300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003340)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000003440)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003480)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000003580)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000003680)={@mcast2, 0x0}, &(0x7f00000036c0)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000004080)={&(0x7f00000000c0), 0xc, &(0x7f0000004040)={&(0x7f0000003700)={0x910, r2, 0x2, 0x70bd2c, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}]}}, {{0x8, 0x1, r7}, {0x24c, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x200, 0x6, 0xffffffffffffffff, 0x5}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x80000000, 0x6, 0x4, 0xfff}, {0x5, 0x3, 0x0, 0x9}, {0x400, 0x7, 0xffff, 0x200}, {0x10000, 0x8, 0x40, 0x7fffffff}, {0x1, 0x2, 0x0, 0x9}, {0x7, 0x7, 0x6, 0x200}, {0x200, 0x4, 0x200, 0x3013}, {0x7fffffff, 0x8, 0x1993ec9d, 0x9}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9c}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8000}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffff}}}]}}, {{0x8, 0x1, r12}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0xb8, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x100000000, 0xfffffffffffffffd, 0x9923, 0x1}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r15}, {0x20c, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x800, 0x7, 0x8, 0x9}, {0x4, 0x81, 0x9, 0x7}, {0x4, 0x1, 0x0, 0xfffffffffffffffc}, {0x7, 0xff, 0x69, 0x8}, {0x401, 0x7fffffff, 0xffffffff, 0x5}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r21}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r22}}}]}}, {{0x8, 0x1, r23}, {0x28c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r25}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xda}}, {0x8, 0x6, r26}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xdd}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x2, 0x7, 0xae5b, 0x80000001}, {0x99, 0x6, 0x19f072ff, 0x6}, {0x7, 0x3, 0xd0}, {0x9, 0x1f, 0x9, 0x586}, {0x0, 0x8, 0x9, 0x1}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r28}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r29}}}]}}]}, 0x910}, 0x1, 0x0, 0x0, 0x840}, 0x800) 00:33:22 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:22 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:22 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='/trfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfp\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:22 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:23 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='b\arfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 798.088538] net_ratelimit: 16 callbacks suppressed [ 798.088583] protocol 88fb is buggy, dev hsr_slave_0 [ 798.098826] protocol 88fb is buggy, dev hsr_slave_1 [ 798.325725] protocol 88fb is buggy, dev hsr_slave_0 [ 798.331291] protocol 88fb is buggy, dev hsr_slave_1 [ 799.284927] protocol 88fb is buggy, dev hsr_slave_0 [ 799.290075] protocol 88fb is buggy, dev hsr_slave_1 [ 799.445459] protocol 88fb is buggy, dev hsr_slave_0 [ 799.451793] protocol 88fb is buggy, dev hsr_slave_1 [ 799.524992] protocol 88fb is buggy, dev hsr_slave_0 [ 799.530114] protocol 88fb is buggy, dev hsr_slave_1 00:33:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfu\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:25 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='b\nrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:25 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:25 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='b%rfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfx\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x4}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='b/rfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x02', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x8}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:28 executing program 1: epoll_create(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000100)={'syz1\x00', {0x8000, 0x5, 0x2, 0x76}, 0x50, [0x58, 0x6, 0x3, 0x7, 0x800, 0xf1a, 0x4, 0x6, 0x30, 0x6, 0xfffffffffffff758, 0x2, 0x3, 0x1000, 0x9, 0x5, 0x1, 0x7, 0x400, 0x9, 0x81, 0x6, 0x6, 0xffff, 0x4, 0x7, 0x9, 0x400, 0x9, 0x7, 0x7, 0x9, 0x6, 0x1000, 0x7000000000, 0xff, 0x5, 0x4, 0x0, 0x61c, 0x2, 0x7fffffff, 0x2, 0x1, 0xe4, 0x7, 0x6, 0x9, 0x2, 0x10000, 0x8, 0x0, 0x6, 0xffffffff7fffffff, 0x3, 0x8001, 0x1, 0x8, 0x6, 0x8, 0x3d4, 0x8000, 0x2, 0x2], [0x3, 0x100, 0x8001, 0x1, 0x2, 0x3, 0x100000000, 0xe80a, 0x5, 0x81, 0x4, 0xfddd, 0x7529da2, 0x80000001, 0x7f, 0x9, 0x5, 0x1, 0x876, 0x67a, 0x1568, 0x1, 0x3, 0x2, 0x5, 0x7, 0x7, 0x5, 0x6, 0x1, 0x100, 0x2, 0x8, 0x1, 0x6, 0x8, 0x9, 0xe, 0x3, 0x1, 0x5, 0xfff, 0x6, 0x8ab, 0x5, 0x9, 0x8, 0x100000001, 0x400, 0xfff, 0x401, 0xffffffff00000001, 0x2, 0x0, 0x2, 0x1, 0x673, 0x400, 0xfffffffffffffbff, 0x5, 0x8, 0x7, 0x7, 0x4c7], [0x80000000, 0x9, 0x2, 0x800, 0x2, 0x700000000000, 0x1, 0x80, 0x800, 0xfc00000000000000, 0x5, 0x1000, 0x7f2e, 0x9, 0x7, 0x789, 0x3, 0x100000000, 0xfff, 0xffff, 0x32d, 0x80000000, 0x4, 0x81, 0x2, 0x800, 0x10001, 0x7ff, 0x7f45, 0x4, 0x10001, 0x2e32, 0x1, 0x200, 0x100000000, 0x0, 0x4, 0x81, 0x2, 0x9, 0x68, 0x9, 0x100000000, 0x0, 0x8001, 0x7f, 0xfff, 0x3ff, 0x4, 0x9, 0x0, 0x6, 0xffffffffffff8000, 0x2, 0x1, 0x7, 0x0, 0x8, 0x9, 0x3, 0x100000000, 0xfffffffffffff800, 0x2, 0x1000], [0x100000000, 0x5, 0xfffffffffffffffb, 0x1, 0x1ff, 0x4, 0x5, 0x401, 0x9, 0x1ff, 0x3, 0x6, 0x74f, 0x7, 0x1, 0x8001, 0x10001, 0x80000000, 0x0, 0x85f1, 0x1, 0x749a, 0x9, 0x401, 0xffff, 0x8000, 0xfff, 0x7ff80, 0xc71, 0x4, 0x1d, 0x7fffffff, 0x10000, 0x535, 0x1, 0x9, 0xf95, 0x80000001, 0x3, 0x2, 0x8, 0x574d, 0x1, 0x5, 0x2, 0x5, 0x46da, 0x5, 0x9, 0x6, 0xc5, 0x7, 0x1, 0x10000, 0xffffffffc45e909d, 0x6060, 0x100000000, 0x400000008000000, 0x1, 0x3, 0x4, 0x92, 0x80000001, 0x100000001]}, 0x45c) openat$vfio(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vfio/vfio\x00', 0x2560c0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/enforce\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f00000005c0)={0x9, 0x8000, 0x3, {}, 0x4, 0x9}) exit(0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000640)=0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000680)=0x2) clock_getres(0x5, &(0x7f0000000700)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x644880, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:28 executing program 5: accept$inet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x698, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/snmp\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000240)=""/35, 0x23}, {0x0}], 0x2}}], 0x1, 0x140, &(0x7f0000000000)={0x0, 0x989680}) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) r1 = getpid() perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x80000000, 0x0, 0xfff, 0x3f, 0x0, 0xfffffffffffffc01, 0x2, 0x8, 0x2627, 0x1f, 0xfffffffffffffffd, 0x0, 0xa0, 0x1, 0x5, 0x0, 0x0, 0xa87, 0x0, 0x100000000, 0x4, 0x1000, 0x5, 0x1f, 0x91, 0x9, 0xff, 0x8, 0x0, 0x0, 0x6, 0x0, 0xad70, 0x400, 0xfffffffffffffffd, 0x66, 0x0, 0x2, 0x0, @perf_config_ext={0x9, 0x8001}, 0x4400, 0x9, 0xcb87, 0x0, 0x23, 0x1, 0x2}, r1, 0x10, r0, 0x8) 00:33:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x03', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='bt\nfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xf}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x10}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x04', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) restart_syscall() ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f033c123f3188a070") keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) unshare(0x20000) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101000, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x894a, &(0x7f0000000040)={'team_slave_0\x00', @ifru_mtu}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="f21f0d5204fe828680a27e969b9d8b62ce3b"], 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080)=0x5, 0x4) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2f70696473202b70696473204cf88d18d56d6f727920b2fbacccdff301bf9039aa01901b075b1eebdaf7c5e225dc3364e3a05ceec0cdd0d071a02b539ede89179ff84282972230cba5bcfb384036443dd66a1d3f2dd889885150780300000000000000dfbe66"], 0x66) getpgrp(0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001400)={0x78, 0x17, 0x101, 0x0, 0x0, {0x4}, [@nested={0x64, 0x2f, [@generic="a99a34d2f79add69e194d04d7684234ec020d454611f35b7da027b7798714a7add6406fda61936789d39ab0c05ce7c3d3290b2e4d1df02e9882461b5acfd1239d9c57c4c7032a9821f45791d424c14e884e1ce0b04fc63bb", @typed={0x8, 0x69, @u32=0x8000}]}]}, 0x78}}, 0x40000) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) 00:33:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='bt\x12fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 803.445420] net_ratelimit: 14 callbacks suppressed [ 803.445431] protocol 88fb is buggy, dev hsr_slave_0 [ 803.455775] protocol 88fb is buggy, dev hsr_slave_1 [ 803.604969] protocol 88fb is buggy, dev hsr_slave_0 [ 803.610128] protocol 88fb is buggy, dev hsr_slave_1 [ 803.684933] protocol 88fb is buggy, dev hsr_slave_0 [ 803.690080] protocol 88fb is buggy, dev hsr_slave_1 [ 804.324904] protocol 88fb is buggy, dev hsr_slave_0 [ 804.330039] protocol 88fb is buggy, dev hsr_slave_1 [ 804.564898] protocol 88fb is buggy, dev hsr_slave_0 [ 804.570223] protocol 88fb is buggy, dev hsr_slave_1 00:33:31 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x40000) ioctl$TCSETS(r0, 0x40045431, 0x0) 00:33:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x47}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x05', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:31 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x14, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0563044000000000925a3aa37c5d5d167a8d319b"], 0x0, 0x0, 0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620c, &(0x7f0000000040)) 00:33:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='bt\"fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xf00}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 805.032046] binder: 20713:20727 unknown command -1556456814 [ 805.066056] binder: 20713:20727 ioctl c0306201 20000240 returned -22 00:33:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 805.078153] binder: BINDER_SET_CONTEXT_MGR already set [ 805.100277] binder: 20713:20733 unknown command -1556456814 [ 805.136089] binder: 20713:20727 ioctl 40046207 0 returned -16 [ 805.151104] binder: 20713:20733 ioctl c0306201 20000240 returned -22 00:33:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x4700}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) 00:33:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='bt%fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:33 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x2, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x06', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x40000}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x1, 0x0) timerfd_settime(r0, 0x0, 0x0, 0x0) 00:33:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='bt/fs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x8000000}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:33:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000002c0)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) read(r0, 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) pipe2(&(0x7f0000000680), 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200), 0x0) 00:33:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btr\ns\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\a', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xf000000}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 808.495615] net_ratelimit: 16 callbacks suppressed [ 808.495661] protocol 88fb is buggy, dev hsr_slave_0 [ 808.506316] protocol 88fb is buggy, dev hsr_slave_1 [ 808.724918] protocol 88fb is buggy, dev hsr_slave_0 [ 808.730483] protocol 88fb is buggy, dev hsr_slave_1 [ 809.685791] protocol 88fb is buggy, dev hsr_slave_0 [ 809.691121] protocol 88fb is buggy, dev hsr_slave_1 [ 809.845716] protocol 88fb is buggy, dev hsr_slave_0 [ 809.851116] protocol 88fb is buggy, dev hsr_slave_1 [ 809.926166] protocol 88fb is buggy, dev hsr_slave_0 [ 809.931621] protocol 88fb is buggy, dev hsr_slave_1 00:33:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x10000000}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:33:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\b', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btr%s\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:37 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000100)={0x3f, 0x0, 0x9}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400400, 0x0) 00:33:37 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x1000000000000011, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000080)='\x00') 00:33:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:33:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btr.s\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) 00:33:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x47000000}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\t', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x4000000000000}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="8eb3"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 00:33:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btr/s\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x800000000000000}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:39 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x40000) ioctl$TCSETS(r0, 0x40045431, 0x0) 00:33:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\n', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrf\n\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:39 executing program 1: r0 = epoll_create(0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r1, 0xfffffffffffffffc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000001c0)='rose0\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000180)=0x6, 0x80000000000b, 0x6, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000)=0x200000000000000, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000380)=0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000003c0)={@dev={0xfe, 0x80, [], 0x26}, r2}, 0x14) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x200082) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x200, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000240)={0x100000001, 0x1, 0x4, 0x102005, {0x0, 0x2710}, {0x3, 0x2, 0x400, 0x9, 0xffffffffffffc3c4, 0x4, "4998b8bb"}, 0x0, 0x7, @planes=&(0x7f0000000200)={0x8000, 0x1, @fd=r4, 0x4}, 0x4}) accept$alg(r4, 0x0, 0x0) connect$pptp(r3, &(0x7f00000002c0)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2000, 0x0) socket$netlink(0x10, 0x3, 0x13) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0xf00000000000000}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\v', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrf#\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x1000000000000000}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 813.845646] net_ratelimit: 14 callbacks suppressed [ 813.845690] protocol 88fb is buggy, dev hsr_slave_0 [ 813.856181] protocol 88fb is buggy, dev hsr_slave_1 [ 814.015441] protocol 88fb is buggy, dev hsr_slave_0 [ 814.020619] protocol 88fb is buggy, dev hsr_slave_1 [ 814.085560] protocol 88fb is buggy, dev hsr_slave_0 [ 814.091215] protocol 88fb is buggy, dev hsr_slave_1 00:33:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x4700000000000000}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 814.725393] protocol 88fb is buggy, dev hsr_slave_0 [ 814.731040] protocol 88fb is buggy, dev hsr_slave_1 [ 814.965310] protocol 88fb is buggy, dev hsr_slave_0 [ 814.970801] protocol 88fb is buggy, dev hsr_slave_1 00:33:42 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrf%\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, 0x0, 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) [ 815.858698] Unknown ioctl -1067952547 [ 816.299489] Unknown ioctl -1067952547 00:33:42 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x6f896fc7a82ebc3) msgctl$IPC_RMID(r0, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, 0x0, 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrf*\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, 0x0, 0x9, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs#', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:44 executing program 5: r0 = epoll_create(0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r1, 0xfffffffffffffffc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000001c0)='rose0\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000180)=0x6, 0x80000000000b, 0x6, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000)=0x200000000000000, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000380)=0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000003c0)={@dev={0xfe, 0x80, [], 0x26}, r2}, 0x14) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x200082) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x200, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000240)={0x100000001, 0x1, 0x4, 0x102005, {0x0, 0x2710}, {0x3, 0x2, 0x400, 0x9, 0xffffffffffffc3c4, 0x4, "4998b8bb"}, 0x0, 0x7, @planes=&(0x7f0000000200)={0x8000, 0x1, @fd=r4, 0x4}, 0x4}) accept$alg(r4, 0x0, 0x0) connect$pptp(r3, &(0x7f00000002c0)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2000, 0x0) socket$netlink(0x10, 0x3, 0x13) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrf+\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 818.885051] net_ratelimit: 16 callbacks suppressed [ 818.885059] protocol 88fb is buggy, dev hsr_slave_0 [ 818.895234] protocol 88fb is buggy, dev hsr_slave_1 [ 819.124964] protocol 88fb is buggy, dev hsr_slave_0 [ 819.130253] protocol 88fb is buggy, dev hsr_slave_1 00:33:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsH', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrf-\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:45 executing program 1: r0 = epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'irlan0\x00', 0x200}) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) getsockopt$inet_opts(r1, 0x0, 0x69a96fed259ee693, &(0x7f00000000c0)=""/112, &(0x7f0000000140)=0x70) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000180)=""/168) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 00:33:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrf.\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsL', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 820.095207] protocol 88fb is buggy, dev hsr_slave_0 [ 820.100836] protocol 88fb is buggy, dev hsr_slave_1 [ 820.255059] protocol 88fb is buggy, dev hsr_slave_0 [ 820.260894] protocol 88fb is buggy, dev hsr_slave_1 [ 820.325036] protocol 88fb is buggy, dev hsr_slave_0 [ 820.330763] protocol 88fb is buggy, dev hsr_slave_1 [ 821.149314] Unknown ioctl -1067952547 00:33:47 executing program 5: r0 = epoll_create(0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r1, 0xfffffffffffffffc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000001c0)='rose0\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000180)=0x6, 0x80000000000b, 0x6, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000)=0x200000000000000, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000380)=0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000003c0)={@dev={0xfe, 0x80, [], 0x26}, r2}, 0x14) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x200082) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x200, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000240)={0x100000001, 0x1, 0x4, 0x102005, {0x0, 0x2710}, {0x3, 0x2, 0x400, 0x9, 0xffffffffffffc3c4, 0x4, "4998b8bb"}, 0x0, 0x7, @planes=&(0x7f0000000200)={0x8000, 0x1, @fd=r4, 0x4}, 0x4}) accept$alg(r4, 0x0, 0x0) connect$pptp(r3, &(0x7f00000002c0)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2000, 0x0) socket$netlink(0x10, 0x3, 0x13) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9}, 0x48) 00:33:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrf/\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsh', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9}, 0x48) 00:33:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 823.165481] Unknown ioctl -1067952547 00:33:49 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsl', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000180)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x9}, 0x48) 00:33:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrf0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:49 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:50 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x1, 0x8, 0x1f, 0x0}, &(0x7f0000000400)=0x10) sendmmsg$inet_sctp(r0, &(0x7f0000000500)=[{&(0x7f0000000280)=@in={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000380)=[{&(0x7f00000002c0)="03753f1f0b269425ce61c3e73c4b1a21af84ffa242026787b6db88de1e2fa9b4573b5e0710352a7061cbc10a56b7e7bf4a610eeaa9cd0f15ec86c1b960a3af113372a5c508658c2b6e1e375d418423f206c4124f6272549eb1d1ae65fadfa00e33c51f2ec39438ca38e0268af6a022f78b51e632989b8bbca65a665a5ae7160de9bd3bea1bcbd4daf8707154dddda20e61b3a8d524652eeb5e45585d7c22c0970e80bbd13b1653718bb5c72efb5a4ba2df4c3149ad3c3ed48599e124db", 0xbd}], 0x1, &(0x7f0000000440)=[@sndrcv={0x30, 0x84, 0x1, {0x6, 0x6, 0x2, 0x1, 0x7fff, 0xffffffff, 0x9dd, 0xab, r1}}, @init={0x18, 0x84, 0x0, {0x36cd0a7a, 0xf7, 0x81, 0x7f}}, @init={0x18, 0x84, 0x0, {0x81, 0x0, 0x4, 0xffffffffffffffb9}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="2eeda845fdde67e124577dfb1b52ec90"}, @init={0x18, 0x84, 0x0, {0x6, 0x5f7000, 0x9, 0x8}}, @authinfo={0x18, 0x84, 0x6, {0x3}}], 0xb0, 0x40000}], 0x1, 0x4000001) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f00000000c0)='ppp0\x00', 0x5) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x8d3d}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r3, 0x2c8, 0xb5}, &(0x7f00000001c0)=0xc) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x3ff, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x3d, 0x6}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfst', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfX\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 824.244907] net_ratelimit: 14 callbacks suppressed [ 824.244914] protocol 88fb is buggy, dev hsr_slave_0 [ 824.255024] protocol 88fb is buggy, dev hsr_slave_1 00:33:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 824.405052] protocol 88fb is buggy, dev hsr_slave_0 [ 824.410552] protocol 88fb is buggy, dev hsr_slave_1 [ 824.484999] protocol 88fb is buggy, dev hsr_slave_0 [ 824.490089] protocol 88fb is buggy, dev hsr_slave_1 [ 825.125681] protocol 88fb is buggy, dev hsr_slave_0 [ 825.131050] protocol 88fb is buggy, dev hsr_slave_1 [ 825.365553] protocol 88fb is buggy, dev hsr_slave_0 [ 825.371061] protocol 88fb is buggy, dev hsr_slave_1 00:33:53 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0)=0x4, 0x80000000000b, 0x4, &(0x7f0000000000), &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsz', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfc\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:53 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x1, 0x8, 0x1f, 0x0}, &(0x7f0000000400)=0x10) sendmmsg$inet_sctp(r0, &(0x7f0000000500)=[{&(0x7f0000000280)=@in={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000380)=[{&(0x7f00000002c0)="03753f1f0b269425ce61c3e73c4b1a21af84ffa242026787b6db88de1e2fa9b4573b5e0710352a7061cbc10a56b7e7bf4a610eeaa9cd0f15ec86c1b960a3af113372a5c508658c2b6e1e375d418423f206c4124f6272549eb1d1ae65fadfa00e33c51f2ec39438ca38e0268af6a022f78b51e632989b8bbca65a665a5ae7160de9bd3bea1bcbd4daf8707154dddda20e61b3a8d524652eeb5e45585d7c22c0970e80bbd13b1653718bb5c72efb5a4ba2df4c3149ad3c3ed48599e124db", 0xbd}], 0x1, &(0x7f0000000440)=[@sndrcv={0x30, 0x84, 0x1, {0x6, 0x6, 0x2, 0x1, 0x7fff, 0xffffffff, 0x9dd, 0xab, r1}}, @init={0x18, 0x84, 0x0, {0x36cd0a7a, 0xf7, 0x81, 0x7f}}, @init={0x18, 0x84, 0x0, {0x81, 0x0, 0x4, 0xffffffffffffffb9}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="2eeda845fdde67e124577dfb1b52ec90"}, @init={0x18, 0x84, 0x0, {0x6, 0x5f7000, 0x9, 0x8}}, @authinfo={0x18, 0x84, 0x6, {0x3}}], 0xb0, 0x40000}], 0x1, 0x4000001) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f00000000c0)='ppp0\x00', 0x5) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x8d3d}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r3, 0x2c8, 0xb5}, &(0x7f00000001c0)=0xc) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x3ff, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x3d, 0x6}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:53 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'dummy0\x00'}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:33:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfd\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x0e', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfi\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 828.297459] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 828.374590] BTRFS error (device loop3): superblock checksum mismatch [ 828.457848] BTRFS error (device loop3): open_ctree failed [ 829.285392] net_ratelimit: 16 callbacks suppressed [ 829.285419] protocol 88fb is buggy, dev hsr_slave_0 [ 829.296210] protocol 88fb is buggy, dev hsr_slave_1 [ 829.525600] protocol 88fb is buggy, dev hsr_slave_0 [ 829.531070] protocol 88fb is buggy, dev hsr_slave_1 [ 830.484909] protocol 88fb is buggy, dev hsr_slave_0 [ 830.490009] protocol 88fb is buggy, dev hsr_slave_1 00:33:57 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x10000, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000100)={0x0, 0x5}, 0x2) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x101000) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfl\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:57 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x1, 0x8, 0x1f, 0x0}, &(0x7f0000000400)=0x10) sendmmsg$inet_sctp(r0, &(0x7f0000000500)=[{&(0x7f0000000280)=@in={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000380)=[{&(0x7f00000002c0)="03753f1f0b269425ce61c3e73c4b1a21af84ffa242026787b6db88de1e2fa9b4573b5e0710352a7061cbc10a56b7e7bf4a610eeaa9cd0f15ec86c1b960a3af113372a5c508658c2b6e1e375d418423f206c4124f6272549eb1d1ae65fadfa00e33c51f2ec39438ca38e0268af6a022f78b51e632989b8bbca65a665a5ae7160de9bd3bea1bcbd4daf8707154dddda20e61b3a8d524652eeb5e45585d7c22c0970e80bbd13b1653718bb5c72efb5a4ba2df4c3149ad3c3ed48599e124db", 0xbd}], 0x1, &(0x7f0000000440)=[@sndrcv={0x30, 0x84, 0x1, {0x6, 0x6, 0x2, 0x1, 0x7fff, 0xffffffff, 0x9dd, 0xab, r1}}, @init={0x18, 0x84, 0x0, {0x36cd0a7a, 0xf7, 0x81, 0x7f}}, @init={0x18, 0x84, 0x0, {0x81, 0x0, 0x4, 0xffffffffffffffb9}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="2eeda845fdde67e124577dfb1b52ec90"}, @init={0x18, 0x84, 0x0, {0x6, 0x5f7000, 0x9, 0x8}}, @authinfo={0x18, 0x84, 0x6, {0x3}}], 0xb0, 0x40000}], 0x1, 0x4000001) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f00000000c0)='ppp0\x00', 0x5) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x8d3d}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r3, 0x2c8, 0xb5}, &(0x7f00000001c0)=0xc) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000200)={0x0, 0x2, 0x0, 0x3ff, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x3d, 0x6}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 830.644917] protocol 88fb is buggy, dev hsr_slave_0 [ 830.650108] protocol 88fb is buggy, dev hsr_slave_1 [ 830.724906] protocol 88fb is buggy, dev hsr_slave_0 [ 830.730048] protocol 88fb is buggy, dev hsr_slave_1 00:33:57 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 830.825824] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 830.856269] BTRFS error (device loop3): superblock checksum mismatch 00:33:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfo\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 830.915654] BTRFS error (device loop3): open_ctree failed 00:33:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x0}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:33:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x4, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 831.353222] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 831.422051] BTRFS error (device loop3): superblock checksum mismatch [ 831.507179] BTRFS error (device loop3): open_ctree failed 00:33:58 executing program 1: epoll_create(0xe5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mq_unlink(&(0x7f0000000000)='GPL/vboxnet0ppp0posix_acl_accesslo&-ppp0eth1bdevwlan1\x00') mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:33:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfp\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:33:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x8, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:33:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 832.078240] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 832.135009] BTRFS error (device loop3): superblock checksum mismatch [ 832.188048] BTRFS error (device loop3): open_ctree failed 00:34:00 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:34:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xf, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:00 executing program 5: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfu\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x10, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x47, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 834.380350] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfx\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 834.454170] BTRFS error (device loop3): superblock checksum mismatch [ 834.546512] BTRFS error (device loop3): open_ctree failed [ 834.645506] net_ratelimit: 14 callbacks suppressed [ 834.645514] protocol 88fb is buggy, dev hsr_slave_0 [ 834.655712] protocol 88fb is buggy, dev hsr_slave_1 [ 834.676522] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 834.746844] BTRFS error (device loop3): superblock checksum mismatch [ 834.804933] protocol 88fb is buggy, dev hsr_slave_0 [ 834.810058] protocol 88fb is buggy, dev hsr_slave_1 [ 834.876353] BTRFS error (device loop3): open_ctree failed [ 834.884913] protocol 88fb is buggy, dev hsr_slave_0 [ 834.890033] protocol 88fb is buggy, dev hsr_slave_1 [ 835.524959] protocol 88fb is buggy, dev hsr_slave_0 [ 835.530065] protocol 88fb is buggy, dev hsr_slave_1 00:34:02 executing program 1: r0 = epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f00006cd000/0x1000)=nil, 0x1000, 0x2000000, 0x803e, r0, 0xffffffffffffffff) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) futex(&(0x7f00000000c0)=0x4, 0x80, 0x4, &(0x7f0000000100)={r2, r3+10000000}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x20002, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r5 = msgget$private(0x0, 0x340) msgsnd(r5, &(0x7f0000000200)={0x3}, 0x8, 0x800) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xf00, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x02', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 835.765928] protocol 88fb is buggy, dev hsr_slave_0 [ 835.771326] protocol 88fb is buggy, dev hsr_slave_1 [ 835.940808] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 835.991901] BTRFS error (device loop3): superblock checksum mismatch [ 836.098752] BTRFS error (device loop3): open_ctree failed 00:34:03 executing program 2: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) 00:34:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x4700, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:03 executing program 5: r0 = epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f00006cd000/0x1000)=nil, 0x1000, 0x2000000, 0x803e, r0, 0xffffffffffffffff) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) futex(&(0x7f00000000c0)=0x4, 0x80, 0x4, &(0x7f0000000100)={r2, r3+10000000}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x20002, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r5 = msgget$private(0x0, 0x340) msgsnd(r5, &(0x7f0000000200)={0x3}, 0x8, 0x800) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x03', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:03 executing program 1: r0 = epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000180)) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f00000000c0)={0x1000, 0x24, 0x40, {0x77359400}, 0x5, 0xe5}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0xe8) r4 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r3, r4) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) fdatasync(r0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x40000, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x8000000, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x04', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 837.582649] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 837.657625] BTRFS error (device loop3): superblock checksum mismatch 00:34:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xf000000, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 837.720788] BTRFS error (device loop3): open_ctree failed 00:34:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x01', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x05', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 839.685324] net_ratelimit: 16 callbacks suppressed [ 839.685333] protocol 88fb is buggy, dev hsr_slave_0 [ 839.695442] protocol 88fb is buggy, dev hsr_slave_1 [ 839.925683] protocol 88fb is buggy, dev hsr_slave_0 [ 839.931006] protocol 88fb is buggy, dev hsr_slave_1 00:34:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000380)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = dup2(r0, r0) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") write$P9_RREADDIR(r1, 0x0, 0x0) 00:34:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x10000000, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x18', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x06', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 840.382962] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 840.408188] BTRFS error (device loop3): superblock checksum mismatch [ 840.470335] BTRFS error (device loop3): open_ctree failed [ 840.884922] protocol 88fb is buggy, dev hsr_slave_0 [ 840.890068] protocol 88fb is buggy, dev hsr_slave_1 [ 841.045590] protocol 88fb is buggy, dev hsr_slave_0 [ 841.050916] protocol 88fb is buggy, dev hsr_slave_1 [ 841.124916] protocol 88fb is buggy, dev hsr_slave_0 [ 841.130020] protocol 88fb is buggy, dev hsr_slave_1 00:34:07 executing program 1: epoll_create(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xf0f}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f0000000000)=0x4, 0x80000000000c, 0x1, 0x0, &(0x7f0000048000)=0x800000000000000, 0x4) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, 0x12, r0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs ', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x47000000, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\a', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x74000000, 0x80000001) 00:34:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x1) 00:34:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x4000000000000, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:07 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2000000000003d) ptrace$cont(0x20, r0, 0x0, 0x7) 00:34:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\b', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:07 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:34:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x800000000000000, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x0f', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:08 executing program 1: epoll_create(0xfffffffffffffffa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:08 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "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"}, 0x1000) 00:34:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid_for_children\x00') 00:34:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0xf00000000000000, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\t', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xa) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1ff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, &(0x7f0000000340)) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000004c0)={@remote, @empty}, 0xc) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000000)={0x6, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}}, 0x88) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) msgget$private(0x0, 0x2) [ 842.448370] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x1000000000000000, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:08 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/validatetrans\x00', 0x1, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr\x00') ioctl$sock_SIOCBRADDBR(r1, 0x89a0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) prctl$PR_CAPBSET_DROP(0x18, 0x1f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, 0x0, &(0x7f0000000280)) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) sendto$inet(r2, &(0x7f0000000b40)="762d013abf428f831f537d10987f3f009e134c11cb6b5d479d61fac22b7c399e31904cab65dc1f2efc95ac1348db76ab634cf0fbde36acede0e45438773d28036919fd3c82e3622eb6f09975594f6b", 0x4f, 0x4008000, 0x0, 0x0) recvmsg(r2, 0x0, 0x40000120) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140)=0xda7, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000180)=""/86, 0x56}], 0x1) 00:34:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\n', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 842.552887] BTRFS error (device loop3): superblock checksum mismatch 00:34:09 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) [ 842.676187] BTRFS error (device loop3): open_ctree failed 00:34:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x4700000000000000, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 842.790063] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 842.854113] BTRFS error (device loop3): superblock checksum mismatch [ 842.986909] BTRFS error (device loop3): open_ctree failed 00:34:10 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\v', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:10 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(r1, r0) 00:34:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") perf_event_open(&(0x7f000001d000)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x4000) 00:34:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x0, 0x2, r2}) [ 844.682827] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 844.744989] BTRFS error (device loop3): superblock checksum mismatch 00:34:11 executing program 2: 00:34:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 844.841400] BTRFS error (device loop3): open_ctree failed 00:34:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:11 executing program 2: [ 845.054897] net_ratelimit: 14 callbacks suppressed [ 845.054905] protocol 88fb is buggy, dev hsr_slave_0 [ 845.065048] protocol 88fb is buggy, dev hsr_slave_1 [ 845.204919] protocol 88fb is buggy, dev hsr_slave_0 [ 845.210075] protocol 88fb is buggy, dev hsr_slave_1 [ 845.285427] protocol 88fb is buggy, dev hsr_slave_0 [ 845.291146] protocol 88fb is buggy, dev hsr_slave_1 [ 845.925365] protocol 88fb is buggy, dev hsr_slave_0 [ 845.930780] protocol 88fb is buggy, dev hsr_slave_1 [ 846.165345] protocol 88fb is buggy, dev hsr_slave_0 [ 846.170887] protocol 88fb is buggy, dev hsr_slave_1 00:34:13 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x7, 0xffffffffffffc419, 0x800, 0x100000001, 0x6, 0xe8, 0x7f}, 0x1c) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) 00:34:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:13 executing program 5: 00:34:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:13 executing program 2: 00:34:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs#', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:13 executing program 5: 00:34:13 executing program 2: 00:34:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:13 executing program 5: 00:34:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:13 executing program 2: 00:34:15 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsF', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:15 executing program 2: 00:34:15 executing program 5: 00:34:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:15 executing program 5: 00:34:15 executing program 2: 00:34:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 848.988619] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsH', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 849.034964] BTRFS error (device loop3): superblock checksum mismatch [ 849.047711] BTRFS error (device loop3): open_ctree failed 00:34:15 executing program 5: 00:34:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 849.458389] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 849.472937] BTRFS error (device loop3): superblock checksum mismatch [ 849.546570] BTRFS error (device loop3): open_ctree failed [ 850.085369] net_ratelimit: 16 callbacks suppressed [ 850.085393] protocol 88fb is buggy, dev hsr_slave_0 [ 850.096138] protocol 88fb is buggy, dev hsr_slave_1 [ 850.324906] protocol 88fb is buggy, dev hsr_slave_0 [ 850.330042] protocol 88fb is buggy, dev hsr_slave_1 [ 851.285365] protocol 88fb is buggy, dev hsr_slave_0 [ 851.290830] protocol 88fb is buggy, dev hsr_slave_1 [ 851.445732] protocol 88fb is buggy, dev hsr_slave_0 [ 851.451298] protocol 88fb is buggy, dev hsr_slave_1 [ 851.525475] protocol 88fb is buggy, dev hsr_slave_0 [ 851.531013] protocol 88fb is buggy, dev hsr_slave_1 00:34:18 executing program 1: r0 = epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) futex(&(0x7f000000cffc), 0x81, 0x200000000, &(0x7f0000000180)={r1, r2+30000000}, &(0x7f00000001c0), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x6a222082) exit(0x0) accept4$tipc(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000240)=0x10, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x3ff, 0x101000) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000080)={0x1000, 0x0, 0x0, 0x3ff}) 00:34:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:18 executing program 2: 00:34:18 executing program 5: 00:34:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsL', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:18 executing program 5: 00:34:18 executing program 2: [ 852.053353] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 852.075049] BTRFS error (device loop3): superblock checksum mismatch [ 852.101019] BTRFS error (device loop3): open_ctree failed 00:34:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\\', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:18 executing program 5: 00:34:18 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, r0, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) 00:34:20 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x1000000000000011, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00') 00:34:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs`', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:20 executing program 1: epoll_create(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000000), r0, &(0x7f00000000c0), 0x9, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x10002, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x1, @bcast, @bpq0='bpq0\x00', 0x40, 'syz0\x00', @default, 0x1, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @default, @null]}) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)='ip_vti0\x00') bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0xe991) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='`', 0x1, 0x0, 0x0, 0x0) 00:34:20 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x100}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580), 0x0, 0x0) 00:34:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 854.072892] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 854.108144] BTRFS error (device loop3): superblock checksum mismatch 00:34:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000000080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0xfffffec7) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xe785}, 0x2c) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) 00:34:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsh', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 854.157853] BTRFS error (device loop3): open_ctree failed 00:34:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsl', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 854.892980] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 854.953730] BTRFS error (device loop3): superblock checksum mismatch [ 855.025310] BTRFS error (device loop3): open_ctree failed [ 855.444927] net_ratelimit: 14 callbacks suppressed [ 855.444934] protocol 88fb is buggy, dev hsr_slave_0 [ 855.455092] protocol 88fb is buggy, dev hsr_slave_1 [ 855.605649] protocol 88fb is buggy, dev hsr_slave_0 [ 855.611028] protocol 88fb is buggy, dev hsr_slave_1 [ 855.684926] protocol 88fb is buggy, dev hsr_slave_0 [ 855.690069] protocol 88fb is buggy, dev hsr_slave_1 [ 856.324937] protocol 88fb is buggy, dev hsr_slave_0 [ 856.330022] protocol 88fb is buggy, dev hsr_slave_1 00:34:22 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x47b, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x81, 0x0) 00:34:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsp', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:22 executing program 1: r0 = epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:22 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000016000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffff7ff00000}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f121e0d3f3188a070") 00:34:22 executing program 2: clock_getres(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 856.564897] protocol 88fb is buggy, dev hsr_slave_0 [ 856.570066] protocol 88fb is buggy, dev hsr_slave_1 00:34:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 856.646856] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 856.681205] BTRFS error (device loop3): superblock checksum mismatch 00:34:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfst', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 856.766144] BTRFS error (device loop3): open_ctree failed 00:34:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:34:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:23 executing program 2: clock_getres(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 00:34:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x20000447}], 0x1}}], 0x2, 0x0, 0x0) 00:34:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsz', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 857.279619] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 857.344965] BTRFS error (device loop3): superblock checksum mismatch [ 857.421449] BTRFS error (device loop3): open_ctree failed 00:34:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x7ffff000}], 0x1}}], 0x2, 0x0, 0x0) 00:34:23 executing program 2: clock_getres(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 857.535700] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 857.604127] BTRFS error (device loop3): superblock checksum mismatch [ 857.755834] BTRFS error (device loop3): open_ctree failed 00:34:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xf4', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:26 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000016c0)=ANY=[@ANYPTR64, @ANYPTR, @ANYPTR64, @ANYRES16=r0], 0x1a) ioctl$VIDIOC_G_FREQUENCY(0xffffffffffffffff, 0xc02c5638, &(0x7f0000001740)={0x0, 0x5, 0x2e58}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000001780)='/dev/mixer\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) 00:34:26 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x1000000000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="550000001e007f5300fe01b2a4a20006004800a8430891000000080012000a000c0000dc9b131338090008009b84136ef75afb83de448daa7227c43ab8221000060cec4fab91d40000000000000000000000009535", 0x55}], 0x1}, 0x0) 00:34:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0xffffffffffffffff}], 0x1}}], 0x2, 0x0, 0x0) 00:34:26 executing program 1: r0 = epoll_create(0x0) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x184, r2, 0x110, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x12c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x9, @mcast2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x3, @local, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x1, @loopback, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x0, @rand_addr="13294b3977880463938cb9d8ee232e7f", 0x7}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'team0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8344}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc50}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x431}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff801}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x10}, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, r4) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xc0', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 860.224666] netlink: 37 bytes leftover after parsing attributes in process `syz-executor2'. 00:34:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) link(&(0x7f0000000100)='./file0\x00', 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0x1c9c380}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r1, &(0x7f0000000080)=""/128, 0x88308aa) 00:34:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x2}}], 0x2, 0x0, 0x0) [ 860.320849] netlink: 37 bytes leftover after parsing attributes in process `syz-executor2'. 00:34:26 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x1000000000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="550000001e007f5300fe01b2a4a20006004800a8430891000000080012000a000c0000dc9b131338090008009b84136ef75afb83de448daa7227c43ab8221000060cec4fab91d40000000000000000000000009535", 0x55}], 0x1}, 0x0) 00:34:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x0e', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 860.486024] net_ratelimit: 16 callbacks suppressed [ 860.486082] protocol 88fb is buggy, dev hsr_slave_0 [ 860.497272] protocol 88fb is buggy, dev hsr_slave_1 00:34:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x0f', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x8}}], 0x2, 0x0, 0x0) [ 860.619685] netlink: 37 bytes leftover after parsing attributes in process `syz-executor2'. [ 860.724912] protocol 88fb is buggy, dev hsr_slave_0 [ 860.730352] protocol 88fb is buggy, dev hsr_slave_1 00:34:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x4}}], 0x2, 0x0, 0x0) 00:34:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000dc00000000000000819500000000000000"], 0x0, 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000002c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r0}) semget(0xffffffffffffffff, 0x0, 0x200) 00:34:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) link(&(0x7f0000000100)='./file0\x00', 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0x1c9c380}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r1, &(0x7f0000000080)=""/128, 0x88308aa) 00:34:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 861.088260] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 861.685217] protocol 88fb is buggy, dev hsr_slave_0 [ 861.690733] protocol 88fb is buggy, dev hsr_slave_1 [ 861.844968] protocol 88fb is buggy, dev hsr_slave_0 [ 861.850169] protocol 88fb is buggy, dev hsr_slave_1 [ 861.924929] protocol 88fb is buggy, dev hsr_slave_0 [ 861.930072] protocol 88fb is buggy, dev hsr_slave_1 00:34:28 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x21) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsJ', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) r3 = syz_open_pts(r0, 0x0) dup2(r2, r3) 00:34:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x8}}], 0x2, 0x0, 0x0) 00:34:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000dc00000000000000819500000000000000"], 0x0, 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000002c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r0}) semget(0xffffffffffffffff, 0x0, 0x200) 00:34:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 862.665032] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 862.680677] BTRFS error (device loop3): superblock checksum mismatch [ 862.688075] BTRFS error (device loop3): open_ctree failed 00:34:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsN', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0xf}}], 0x2, 0x0, 0x0) 00:34:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000dc00000000000000819500000000000000"], 0x0, 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000002c0)={r0, r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r0}) semget(0xffffffffffffffff, 0x0, 0x200) 00:34:29 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x8d0, 0x400080) sendmsg$nl_route(r1, 0x0, 0x4048040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, &(0x7f0000000280)='./bus/../file0\x00', 0x0, 0x7ff, &(0x7f00000002c0)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, &(0x7f0000000680)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) fallocate(r3, 0x1c, 0xe58, 0x8) bind(r2, &(0x7f0000000580)=@ax25={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose, @netrom, @bcast, @bcast, @null]}, 0x80) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000440)={0x0, 0x5, 0x8, 0x2, 0x8}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00L\x00\x00\x00\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 00:34:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsk', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 862.987857] audit: type=1400 audit(1547685269.316:104): avc: denied { ioctl } for pid=22363 comm="syz-executor5" path="socket:[102006]" dev="sockfs" ino=102006 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:34:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x10}}], 0x2, 0x0, 0x0) [ 863.081142] bond0: Releasing backup interface bond_slave_1 [ 863.119087] audit: type=1400 audit(1547685269.396:105): avc: denied { getopt } for pid=22363 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 863.223129] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 863.304198] bond0: Releasing backup interface bond_slave_1 [ 863.401846] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:34:31 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x10004080006c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @broadcast}, 0x10) 00:34:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x47}}], 0x2, 0x0, 0x0) 00:34:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xb8', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000100)}}], 0x1, 0x0) [ 864.794996] device veth0_to_bridge entered promiscuous mode 00:34:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0xf00}}], 0x2, 0x0, 0x0) [ 864.855327] device veth0_to_bridge left promiscuous mode 00:34:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 864.902960] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e2, &(0x7f0000000040)) 00:34:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xee', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 864.995070] BTRFS error (device loop3): superblock checksum mismatch 00:34:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x4700}}], 0x2, 0x0, 0x0) [ 865.116190] BTRFS error (device loop3): open_ctree failed 00:34:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 865.311248] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 865.374713] BTRFS error (device loop3): superblock checksum mismatch [ 865.516386] BTRFS error (device loop3): open_ctree failed [ 865.845265] net_ratelimit: 14 callbacks suppressed [ 865.845301] protocol 88fb is buggy, dev hsr_slave_0 [ 865.855392] protocol 88fb is buggy, dev hsr_slave_1 [ 866.004999] protocol 88fb is buggy, dev hsr_slave_0 [ 866.010107] protocol 88fb is buggy, dev hsr_slave_1 [ 866.095286] protocol 88fb is buggy, dev hsr_slave_0 [ 866.100612] protocol 88fb is buggy, dev hsr_slave_1 [ 866.724924] protocol 88fb is buggy, dev hsr_slave_0 [ 866.730056] protocol 88fb is buggy, dev hsr_slave_1 [ 866.964912] protocol 88fb is buggy, dev hsr_slave_0 [ 866.970032] protocol 88fb is buggy, dev hsr_slave_1 00:34:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:33 executing program 2: pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000015c0)=""/109) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000001400)={@multicast2, @broadcast}, &(0x7f0000001440)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) ioprio_set$pid(0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000480)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0x9) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) sendmmsg(r2, &(0x7f0000002e40)=[{{&(0x7f0000000180)=@un=@file={0x1, './bus\x00'}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001480)="f4999d24d6746022abaf02ab78d8f3aded4964beedaa14fca72ca17e475bc73326bc6b7a2e8270c381699732f3557fc6a3eb742abc38c144974224c01982e288c3b780cf96ba712f2928fb9545272c2a6e0b38fde0c9380e5cdddc2a45e7a82445fd8c2a0d5f277760bed506323c48f56de9eebc8ac71ee4e356f978be98d8efde8b788822d058be3387b8006a9ec57461a77dc88c5180311ad2e50800815d7de4141504942fc7214bb0a97f82386150a0710110c55561ae90e78fefda59c08e4f893c49d5b00e642de342b9ba799bb729c01380acc16387be7d16f55a", 0xdd}], 0x1, 0x0, 0x0, 0x10}, 0x1000}, {{&(0x7f0000001700)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x0, @broadcast}, 0x2, 0x3}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0xc3}], 0x2, 0x8005) fstat(0xffffffffffffffff, &(0x7f00000005c0)) r6 = dup3(0xffffffffffffffff, r3, 0x0) fchdir(r2) ioctl$TIOCEXCL(r1, 0x540c) epoll_pwait(r0, &(0x7f0000000340)=[{}], 0x1, 0xe7, &(0x7f0000001380)={0x94d}, 0x8) symlink(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./bus\x00') connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendto(r6, &(0x7f0000000380)="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", 0xfe0, 0x4000000, 0x0, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x8200, 0x41) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x45) 00:34:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x40000}}], 0x2, 0x0, 0x0) 00:34:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000f00)=ANY=[], 0x0) unlink(0x0) inotify_init() geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f0000000140)=@un=@abs, &(0x7f00000001c0)=0x80) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e23, 0xf25a, @mcast2, 0xfffffffffffffff7}}, 0x0, 0x3, 0x0, "4d0aace456c00eedabffb24be5c717763d7cf747e13022d91ac28d8e739e62526605a328121d86f719d79d241b2a9b0fba2e826f28bcfa265294262241b3ce694167f2d7cdf5ae87c3309a948a7b3b8f"}, 0xd8) getrandom(&(0x7f0000000040)=""/59, 0xfe63, 0x0) 00:34:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:33 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x553, 0xc0000) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000200)={0xf, @raw_data="7489cfda1e9fd5fbfc92048559a69eefba4133fb48473292d3491391380e91a209e40b1d2cbb7f1b33d2e46d3eb48f4ce4f41e83e2231b4f0cb41cf99047cb49f6173cbdce73409dc0c272c71cf628f7933f6e65474caf40a7f8c441af9c433321fbc9b7b73d680fce1d4ca917b47bc504f497560e93b59573b53b7569462af795dc1e6248285ea39bb7ded0653f720a37e250722e963a4f96293688a625fbeccb93900746e5b24aa51affc9112f697e5a05770a8b96e0085f3a0c9ff6b39b9475be7c58e9096c42"}) exit(0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x8c001) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xfff, 0x3) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000300)=@buf) socket$inet_dccp(0x2, 0x6, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tables_names\x00') r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x8000000}}], 0x2, 0x0, 0x0) [ 867.163876] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 867.188771] BTRFS error (device loop3): superblock checksum mismatch [ 867.219820] BTRFS error (device loop3): open_ctree failed [ 867.230306] audit: type=1804 audit(1547685273.556:106): pid=22492 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir334555575/syzkaller.uYCKcC/496/bus" dev="sda1" ino=16559 res=1 [ 867.271049] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 867.317498] BTRFS error (device loop3): superblock checksum mismatch 00:34:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0xf000000}}], 0x2, 0x0, 0x0) [ 867.388066] audit: type=1804 audit(1547685273.716:107): pid=22498 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir334555575/syzkaller.uYCKcC/496/bus" dev="sda1" ino=16559 res=1 [ 867.436508] BTRFS error (device loop3): open_ctree failed [ 867.528947] IPVS: ftp: loaded support on port[0] = 21 [ 867.592484] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 867.646576] BTRFS error (device loop3): superblock checksum mismatch 00:34:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x10000000}}], 0x2, 0x0, 0x0) [ 867.690716] BTRFS error (device loop3): open_ctree failed 00:34:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xa0', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 867.737986] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 867.777413] BTRFS error (device loop3): superblock checksum mismatch [ 867.866250] BTRFS error (device loop3): open_ctree failed 00:34:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x47000000}}], 0x2, 0x0, 0x0) [ 868.006958] IPVS: ftp: loaded support on port[0] = 21 00:34:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 868.066478] audit: type=1804 audit(1547685274.396:108): pid=22492 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir334555575/syzkaller.uYCKcC/496/bus" dev="sda1" ino=16559 res=1 [ 868.153941] audit: type=1804 audit(1547685274.396:109): pid=22492 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir334555575/syzkaller.uYCKcC/496/bus" dev="sda1" ino=16559 res=1 [ 868.248100] audit: type=1804 audit(1547685274.526:110): pid=22535 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir334555575/syzkaller.uYCKcC/496/bus" dev="sda1" ino=16559 res=1 00:34:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x4000000000000}}], 0x2, 0x0, 0x0) 00:34:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 870.884935] net_ratelimit: 16 callbacks suppressed [ 870.884943] protocol 88fb is buggy, dev hsr_slave_0 [ 870.895009] protocol 88fb is buggy, dev hsr_slave_1 00:34:37 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) fsync(r0) 00:34:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xc0', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) io_setup(0xffffffff, &(0x7f00000001c0)=0x0) io_cancel(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff8, r0, &(0x7f00000003c0)="b9e1344a31e2a62d03fa039991249ce83a836a2e6dfa66620c091dc851e498eb5d73546848f25e51fb6623ccf4b0fef118b8520722ec6c3bcd9508cb3730dcab7079fa92abf433f175171a17c31aa486adeabfc73bb95548e7d59d9c2bb0ea723f4a24b5bf36182268c61d6dcc35cdc6963ead349335b7969e1ea129c5181742ffffcf384dd695078393064db861d430a6e1077d7a8d71ccaac0f9ce2f20b70cc89638c8deaffd681a", 0xa9, 0x7, 0x0, 0x1, r0}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x0, 0x1, 0x1, 0xc, 0x8, 0xfffffffffffffffa, 0x1}, 0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00004e8000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) getpeername(r4, &(0x7f0000000140)=@can, &(0x7f0000000280)=0x80) write$P9_RAUTH(r3, &(0x7f00000000c0)={0x14, 0x67, 0x1, {0x0, 0x3, 0x8}}, 0x14) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000200)={{0x4000, 0x0, 0xa, 0x0, 0x1}, 0x9e3a, 0xe049, 0x3}) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000001400)={0x0, 0x4c00007e, &(0x7f00000013c0)={&(0x7f0000000100)={0x14, 0x17, 0x101, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 00:34:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x800000000000000}}], 0x2, 0x0, 0x0) 00:34:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:37 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f00002f5000/0x4000)=nil, 0x4000, 0x6, 0x8000000008031, 0xffffffffffffffff, 0x1) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) [ 871.124909] protocol 88fb is buggy, dev hsr_slave_0 [ 871.130016] protocol 88fb is buggy, dev hsr_slave_1 [ 871.250891] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) io_cancel(0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000180)={{0x80}, 'port0\x00'}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00004e8000), 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:34:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xe5', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0xf00000000000000}}], 0x2, 0x0, 0x0) [ 871.299140] BTRFS error (device loop3): superblock checksum mismatch [ 871.371901] BTRFS error (device loop3): open_ctree failed 00:34:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x1000000000000000}}], 0x2, 0x0, 0x0) 00:34:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00'}) 00:34:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x4700000000000000}}], 0x2, 0x0, 0x0) [ 871.486974] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 871.510662] BTRFS error (device loop3): superblock checksum mismatch 00:34:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r0, 0x9) [ 871.570288] BTRFS error (device loop3): open_ctree failed 00:34:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xe7', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x4}}], 0x2, 0x0, 0x0) 00:34:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r0, 0x9) 00:34:38 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x259, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x800000}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) lsetxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@v2={0x5, 0x1, 0x2, 0x80, 0x2d, "7f70d4acd1beabbdf94882c8cc53ef2b76200f70f394d97a5b40d1925513806334d71f4f9411a490ea13113510"}, 0x37, 0x1) 00:34:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x8}}], 0x2, 0x0, 0x0) 00:34:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r0, 0x9) 00:34:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 872.084908] protocol 88fb is buggy, dev hsr_slave_0 [ 872.090013] protocol 88fb is buggy, dev hsr_slave_1 00:34:38 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0}) [ 872.244920] protocol 88fb is buggy, dev hsr_slave_0 [ 872.250025] protocol 88fb is buggy, dev hsr_slave_1 [ 872.324898] protocol 88fb is buggy, dev hsr_slave_0 [ 872.330027] protocol 88fb is buggy, dev hsr_slave_1 00:34:38 executing program 2: faccessat(0xffffffffffffff9c, &(0x7f00000315c0)='.\x00', 0x4, 0x0) 00:34:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0xf}}], 0x2, 0x0, 0x0) 00:34:38 executing program 5: mkdir(&(0x7f0000000340)='./control\x00', 0x0) open(&(0x7f0000000000)='./control\x00', 0xc40beb2474dfd22a, 0x0) 00:34:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:39 executing program 5: pipe(&(0x7f0000000140)) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='fd/4\x00') io_setup(0x6d3, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000002880)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x0, r0, 0x0}]) 00:34:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x10}}], 0x2, 0x0, 0x0) [ 872.685736] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 872.692968] BTRFS error (device loop3): superblock checksum mismatch 00:34:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) [ 872.798502] BTRFS error (device loop3): open_ctree failed 00:34:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x47}}], 0x2, 0x0, 0x0) 00:34:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:34:41 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40100, 0x0) accept4$unix(r1, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e, 0x800) 00:34:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) shutdown(r0, 0x0) 00:34:41 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001840)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x148}) 00:34:41 executing program 2: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r0 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000200)=0x1) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r2 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r2, 0x200000000000002, &(0x7f00000027c0)="025c762038aeb77538031367687e41515dfa0bfd4a1417ff27bf4d560eac82d44bbe2e2a3af1db772e8073ddd8780bdd2d7126c27b0baf8ceb584aae67909bf7bf90afc06d5e83d2caae39e0ffdf90bbdbd3805ec2284ff8e2844fdb2abf0293c027e5fdadf02a278fd891de9347cc97da3a2e7c8280cff965b9074253bc3db306769f7576f36817c9a7ef13866e9012129fdcc0fa6abac30d7941953b4fc8316402bdc14f986625992c041f3e06b071296a9e25237aa5c677a60e2db5d6c6f89b56db44dff92827ac7ff4cf69900031428faa4f5209df8a9a4564e26bc87ca1674024c02ef5c3b75db58539b180ce7860a4daee76d04d2af07925d06b1902b74a65ffda708e89474207fb5474aaf4d427e8d2a64301b27c3f1549244c9cff1eea4ff11b2e5edf01e6b6d7b3a5903a1ac7966426e95353c0a8ff1fbce7a75bc073756f23d85e9e1dd95b33e52414dfcb49f654bfe41ce841e8269fa9f5f6b7120209f2baf8371926c82b7075e706010ef9710665a2fd0d0824f0650c4dce82107db413ea6eceac473e8aff73515800f342149c500c6bf53e5d0a7fac6407daf71cc7836780393494891779a6f0dc433ed515ce6f932f8a048472894059844a7ddcfc536b7c76cc41d98115511fff60bdecc902c9458a6216b9c9c42d03f887463e4e89384b08a38fb0c99ce1d2f7543b0f90f605580cc7ff407f5ecc694e372329755056af36fa5f406ab08975c7d4974f86a23f78fb9254094f55c8acef78557bc9495a09a02be75d2234148f5017c9f79d520bc63883fef43c461b14cc73d51ff995f570d09e2e919dbb66798cb3dc66ae64c041540259d8bacec61f6c806cb5963ccc8b64791509ffb2f304bed42d48d5e2b5bd0cf67f7f7e32a82da8df62b24e8f6bca731626872b3821dc00000000000000000000b809976e5f395101704c10c0b7c48deb2cea72f2b687b10b386338076084eb0c88fe0d7b1b5a116a54d55e69dfae44eb04fee516a54a1a") r3 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000580)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000280)={'yam0\x00', 0x0}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000300)="8065e43dd681eea42bf6c14faeac8d4b", 0x10) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @empty, 0xb0, 0xfffffffffffffffe, 0x7fffffff, 0x400, 0x5d, 0x214, r4}) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f00000005c0)="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") r5 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r5, 0x29, 0xcf, &(0x7f0000000840)=0x1, 0x12d) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0x2, 0x10000}, 0x20) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x2}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000480)=0xc) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000001c0)=r4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(r3, 0x541c, &(0x7f0000000500)={0x5, 0x9, 0x5, 0x100000000, 0x40001}) fcntl$setownex(r3, 0xf, &(0x7f0000000100)={0x1}) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x8001) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r6, &(0x7f00000000c0)=0x202, 0xdd) mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x0, &(0x7f0000000000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='wlan1:[\xf6ppp0\x00', 0xffffffffffffff9c}, 0x791574755d3b3289) 00:34:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0xf00}}], 0x2, 0x0, 0x0) [ 875.685648] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 875.763920] BTRFS error (device loop3): superblock checksum mismatch [ 875.795558] BTRFS error (device loop3): open_ctree failed [ 875.804821] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x832, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x0, &(0x7f0000001fc0), 0xb}}], 0x4000000000003f0, 0x0) 00:34:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x4700}}], 0x2, 0x0, 0x0) 00:34:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 875.831479] BTRFS error (device loop3): superblock checksum mismatch [ 875.940478] BTRFS error (device loop3): open_ctree failed 00:34:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x40000}}], 0x2, 0x0, 0x0) [ 876.065219] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 876.073142] BTRFS error (device loop3): superblock checksum mismatch [ 876.086155] BTRFS error (device loop3): open_ctree failed [ 876.105860] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 876.126188] BTRFS error (device loop3): superblock checksum mismatch [ 876.179156] BTRFS error (device loop3): open_ctree failed 00:34:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 876.244915] net_ratelimit: 14 callbacks suppressed [ 876.244923] protocol 88fb is buggy, dev hsr_slave_0 [ 876.255098] protocol 88fb is buggy, dev hsr_slave_1 00:34:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x8000000}}], 0x2, 0x0, 0x0) [ 876.404911] protocol 88fb is buggy, dev hsr_slave_0 [ 876.410010] protocol 88fb is buggy, dev hsr_slave_1 [ 876.484914] protocol 88fb is buggy, dev hsr_slave_0 [ 876.490032] protocol 88fb is buggy, dev hsr_slave_1 [ 876.564344] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 876.624943] BTRFS error (device loop3): superblock checksum mismatch [ 876.636101] BTRFS error (device loop3): open_ctree failed [ 876.666523] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 876.694657] BTRFS error (device loop3): superblock checksum mismatch [ 876.776441] BTRFS error (device loop3): open_ctree failed [ 877.125770] protocol 88fb is buggy, dev hsr_slave_0 [ 877.131270] protocol 88fb is buggy, dev hsr_slave_1 [ 877.365249] protocol 88fb is buggy, dev hsr_slave_0 [ 877.370525] protocol 88fb is buggy, dev hsr_slave_1 00:34:44 executing program 1: epoll_create(0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={r1, 0x80}, &(0x7f0000000180)=0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lapb0\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000000200)={0x1d, r2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(r0, 0x0, &(0x7f0000000240), 0x800) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$x25(r0, &(0x7f0000000280)={0x9, @null=' \x00'}, 0x12) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0xf000000}}], 0x2, 0x0, 0x0) 00:34:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:44 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) io_setup(0x9, &(0x7f0000000500)) 00:34:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:44 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620c, &(0x7f0000000040)) [ 878.282708] binder: 22805:22812 ioctl c018620c 20000040 returned -1 [ 878.318025] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 878.365269] BTRFS error (device loop3): superblock checksum mismatch [ 878.372198] BTRFS error (device loop3): open_ctree failed 00:34:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 00:34:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x10000000}}], 0x2, 0x0, 0x0) [ 878.431839] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 878.445067] BTRFS error (device loop3): superblock checksum mismatch 00:34:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 878.535860] BTRFS error (device loop3): open_ctree failed 00:34:45 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:34:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x47000000}}], 0x2, 0x0, 0x0) 00:34:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 878.767053] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 878.843426] BTRFS error (device loop3): superblock checksum mismatch [ 878.916080] BTRFS error (device loop3): open_ctree failed [ 879.027963] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 879.055460] BTRFS error (device loop3): superblock checksum mismatch [ 879.096795] BTRFS error (device loop3): open_ctree failed [ 879.149025] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 879.173365] BTRFS error (device loop3): superblock checksum mismatch [ 879.325733] BTRFS error (device loop3): open_ctree failed 00:34:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x4000000000000}}], 0x2, 0x0, 0x0) 00:34:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) 00:34:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000002c0)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) pipe2(&(0x7f0000000680), 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x1e9, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_pts(r0, 0x0) 00:34:47 executing program 1: epoll_create(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{}, {0x20, '\x95'}, {}, {}], 0xa, "1183157c1f4835a098ca5cce447e5ad1d948d11510c9b1268f22c18dd2a4db69a5b871c6792833a02fd04c692e4407f5648b4a3e0bfc9a114285cae26d1d1f3ddffbbade0f7e8d2b8f8972108d404512cfd3cb541b7299352239bfc7bed5c121334560fd95f7b0ccf93a27dd4dcadb3310dbd276208fd56872b45ab4fa1059df8c8794cbaf203ac8238ead70d467d860ec1234a8cb5eb0d0f96a738048dab5e67d1ce2e90e52d0ec06d9f268d438b28d958a9f1709e4b65f25bc32db7a3651726dcc5eeeb4e0f6a6f00ff70a4ae6c86bbc1c4448a240ea87b408d3103a425cfecf"}, 0xf1) futex(&(0x7f000000cffc)=0x2, 0x80000000000b, 0x2, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x800000000000000}}], 0x2, 0x0, 0x0) [ 880.940461] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 880.970600] BTRFS error (device loop3): superblock checksum mismatch [ 881.003003] BTRFS error (device loop3): open_ctree failed [ 881.036436] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 881.084920] BTRFS error (device loop3): superblock checksum mismatch 00:34:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0xf00000000000000}}], 0x2, 0x0, 0x0) [ 881.230735] BTRFS error (device loop3): open_ctree failed [ 881.284917] net_ratelimit: 16 callbacks suppressed [ 881.284952] protocol 88fb is buggy, dev hsr_slave_0 [ 881.295198] protocol 88fb is buggy, dev hsr_slave_1 00:34:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x1000000000000000}}], 0x2, 0x0, 0x0) 00:34:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 881.486886] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 881.518206] BTRFS error (device loop3): superblock checksum mismatch [ 881.525065] protocol 88fb is buggy, dev hsr_slave_0 [ 881.530181] protocol 88fb is buggy, dev hsr_slave_1 00:34:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/dev_mcast\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 00:34:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x4700000000000000}}], 0x2, 0x0, 0x0) [ 881.606761] BTRFS error (device loop3): open_ctree failed 00:34:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x01', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 881.711653] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/dev_mcast\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 00:34:48 executing program 5: sendto$rose(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x12}]}}}]}, 0x3c}}, 0x0) [ 881.796147] BTRFS error (device loop3): superblock checksum mismatch [ 881.850994] BTRFS error (device loop3): open_ctree failed [ 882.496313] protocol 88fb is buggy, dev hsr_slave_0 [ 882.501788] protocol 88fb is buggy, dev hsr_slave_1 [ 882.644983] protocol 88fb is buggy, dev hsr_slave_0 [ 882.650095] protocol 88fb is buggy, dev hsr_slave_1 [ 882.735458] protocol 88fb is buggy, dev hsr_slave_0 [ 882.740729] protocol 88fb is buggy, dev hsr_slave_1 00:34:49 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:34:49 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='net/dev_mcast\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 00:34:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x18', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:34:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000480)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x267) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') read$eventfd(r1, 0x0, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000200)=""/181, 0xb5}], 0x1) 00:34:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 883.543219] FAT-fs (loop5): bogus number of reserved sectors [ 883.550213] FAT-fs (loop5): Can't find a valid FAT filesystem [ 883.573479] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs ', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 883.606055] BTRFS error (device loop3): superblock checksum mismatch [ 883.681533] FAT-fs (loop5): bogus number of reserved sectors [ 883.700498] FAT-fs (loop5): Can't find a valid FAT filesystem [ 883.725931] BTRFS error (device loop3): open_ctree failed 00:34:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x800) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f00000000c0)) 00:34:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:34:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, &(0x7f0000000080)) 00:34:52 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x10000) exit(0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000000c0)=0x3e002, 0x4) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x0f', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:34:52 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x400000000003b, 0x0, 0x0) 00:34:52 executing program 5: openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) 00:34:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="8eb3"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:34:52 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r1 = getpgrp(0x0) write$cgroup_pid(r0, &(0x7f00000000c0)=r1, 0x12) 00:34:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 886.265365] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 886.369140] BTRFS error (device loop3): superblock checksum mismatch 00:34:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 886.456813] BTRFS error (device loop3): open_ctree failed 00:34:52 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x1004e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f00000003c0)={0xf, 0x102, 0x1, {0xfff, 0xff, 0x0, 0x93}}) write$P9_RGETLOCK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB=')\x00em0eth0+cgroupcpusetcpuset-trustedmd5sum\x00'], 0x2b) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x2000141042, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000380)={0x2, r2}) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x8000fffffffe) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000100)=0x200) open$dir(&(0x7f0000000080)='./bus\x00', 0x8002, 0x8) sendmsg$nl_generic(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xa0, 0x17, 0x300, 0x70bd29, 0x25dfdbfd, {0x4}, [@generic="f060ad31f02c6f4149313940e793fcdac63ca1b92f90e86b3ec027188e59cd791ef4bf8efde532ec178a5bc0ccd943014b7a4e97d87878fc7c1b3ab2354118cc78f32df96c775c4c7cceac6dc6f4d2c62fc97d7bbac4034a7c73f9b7f81d481392c0d7eb50cb178bd99d30ff10c5d30219a242ff54576802a6efcf1a3a4b5997057734cdf63283ed78b9"]}, 0xa0}, 0x1, 0x0, 0x0, 0x1}, 0x24048811) [ 886.529280] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 886.566924] BTRFS error (device loop3): superblock checksum mismatch [ 886.640972] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 886.664908] net_ratelimit: 14 callbacks suppressed [ 886.664940] protocol 88fb is buggy, dev hsr_slave_0 [ 886.676003] protocol 88fb is buggy, dev hsr_slave_1 [ 886.747463] BTRFS error (device loop3): open_ctree failed [ 886.804942] protocol 88fb is buggy, dev hsr_slave_0 [ 886.810049] protocol 88fb is buggy, dev hsr_slave_1 [ 886.884921] protocol 88fb is buggy, dev hsr_slave_0 [ 886.890135] protocol 88fb is buggy, dev hsr_slave_1 [ 887.524955] protocol 88fb is buggy, dev hsr_slave_0 [ 887.530142] protocol 88fb is buggy, dev hsr_slave_1 [ 887.766187] protocol 88fb is buggy, dev hsr_slave_0 [ 887.771692] protocol 88fb is buggy, dev hsr_slave_1 00:34:54 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x4c2640, 0x101) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:34:54 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/125, 0x7d}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3ba, 0x0) 00:34:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_mr_vif\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 888.488168] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 888.507856] BTRFS error (device loop3): superblock checksum mismatch 00:34:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:34:54 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/125, 0x7d}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3ba, 0x0) 00:34:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000200)=0x1, 0x4) [ 888.573689] BTRFS error (device loop3): open_ctree failed [ 888.601691] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 888.726881] BTRFS error (device loop3): superblock checksum mismatch [ 888.796549] BTRFS error (device loop3): open_ctree failed 00:34:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 889.226198] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 889.290254] BTRFS error (device loop3): superblock checksum mismatch [ 889.366005] BTRFS error (device loop3): open_ctree failed 00:34:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/125, 0x7d}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3ba, 0x0) 00:34:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:34:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:57 executing program 1: r0 = epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x803f, r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x3ff}) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x8000}, 0x4) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000200)=0x1, 0x4) 00:34:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 891.418150] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 891.442550] BTRFS error (device loop3): superblock checksum mismatch [ 891.450760] BTRFS error (device loop3): open_ctree failed [ 891.468590] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 891.526518] BTRFS error (device loop3): superblock checksum mismatch 00:34:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f0000000340)="3ee7c97c85438ed1304d8d8340d057c7dfc5350ed1f1a52eeb37fb72da2ca7f80ebbfe66e20fae1f50bde95b89566ad1f244cb217e3da7f6a08108fc0ddb276b2e1b2f3e896e8672e34bdf1633d127288da4afb0b0648e36af013308f5", 0x5d, 0x9}], 0x80, 0x0) 00:34:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 891.616085] BTRFS error (device loop3): open_ctree failed [ 891.684913] net_ratelimit: 16 callbacks suppressed [ 891.684921] protocol 88fb is buggy, dev hsr_slave_0 [ 891.689971] protocol 88fb is buggy, dev hsr_slave_1 [ 891.812839] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 891.860635] BTRFS error (device loop3): superblock checksum mismatch [ 891.892705] BTRFS error (device loop3): open_ctree failed [ 891.924726] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 891.932111] protocol 88fb is buggy, dev hsr_slave_0 [ 891.932182] protocol 88fb is buggy, dev hsr_slave_1 00:34:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 891.979432] BTRFS error (device loop3): superblock checksum mismatch [ 891.986936] XFS (loop5): Invalid superblock magic number 00:34:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 00:34:58 executing program 5: mkdir(&(0x7f0000000300)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mount$overlay(0x400000, &(0x7f0000000340)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) [ 892.155387] BTRFS error (device loop3): open_ctree failed [ 892.265781] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:58 executing program 1: epoll_create(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f000011f000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x4) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 892.316735] BTRFS error (device loop3): superblock checksum mismatch [ 892.350288] BTRFS error (device loop3): open_ctree failed 00:34:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000200)=0x1, 0x4) [ 892.406769] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 892.437190] BTRFS error (device loop3): superblock checksum mismatch 00:34:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 892.477569] overlayfs: filesystem on './file0' not supported as upperdir [ 892.516310] BTRFS error (device loop3): open_ctree failed 00:34:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x832, 0x4) r2 = accept4(r1, 0x0, &(0x7f0000000140), 0x800) syz_init_net_socket$x25(0x9, 0x5, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000000c0), 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x0, &(0x7f0000001fc0), 0xb}}], 0x4000000000003f0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:34:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 892.706238] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 892.725090] BTRFS error (device loop3): superblock checksum mismatch [ 892.747783] BTRFS error (device loop3): open_ctree failed [ 892.883270] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 892.894891] protocol 88fb is buggy, dev hsr_slave_0 [ 892.899972] protocol 88fb is buggy, dev hsr_slave_1 [ 892.923692] BTRFS error (device loop3): superblock checksum mismatch [ 892.949910] BTRFS error (device loop3): open_ctree failed 00:34:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x4}], 0x2, 0x0, 0x0) [ 892.982742] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 893.039530] BTRFS error (device loop3): superblock checksum mismatch [ 893.055641] protocol 88fb is buggy, dev hsr_slave_0 [ 893.061242] protocol 88fb is buggy, dev hsr_slave_1 00:34:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:34:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x8}], 0x2, 0x0, 0x0) [ 893.125239] protocol 88fb is buggy, dev hsr_slave_0 [ 893.130324] protocol 88fb is buggy, dev hsr_slave_1 00:34:59 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0) [ 893.185710] BTRFS error (device loop3): open_ctree failed [ 893.286025] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:34:59 executing program 1: r0 = epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0xfffffffffffffffd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:34:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x88', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:34:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0xf}], 0x2, 0x0, 0x0) [ 893.347077] BTRFS error (device loop3): superblock checksum mismatch 00:34:59 executing program 2: capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000140)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) get_robust_list(r1, 0x0, 0x0) 00:34:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x10}], 0x2, 0x0, 0x0) [ 893.445908] BTRFS error (device loop3): open_ctree failed [ 893.575488] capability: warning: `syz-executor2' uses 32-bit capabilities (legacy support in use) 00:35:00 executing program 5: r0 = gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000280)) r1 = memfd_create(&(0x7f0000000100)='#em3#/\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) tkill(r0, 0x15) 00:35:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:00 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000680), 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x1e9, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x47}], 0x2, 0x0, 0x0) 00:35:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0xf00}], 0x2, 0x0, 0x0) [ 894.356292] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 894.388102] BTRFS error (device loop3): superblock checksum mismatch 00:35:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000380)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 894.439580] BTRFS error (device loop3): open_ctree failed [ 894.481131] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 894.505181] BTRFS error (device loop3): superblock checksum mismatch [ 894.546012] BTRFS error (device loop3): open_ctree failed [ 894.680456] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 894.745443] BTRFS error (device loop3): superblock checksum mismatch [ 894.815305] BTRFS error (device loop3): open_ctree failed 00:35:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x4700}], 0x2, 0x0, 0x0) 00:35:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:02 executing program 2: socket$unix(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000156, 0x0) 00:35:02 executing program 1: epoll_create(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x101002) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f00000000c0)={0x0, @data}) ftruncate(r0, 0x2298ab16) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000340)={0x5, 0x5, 0x1, 0xfffffffffffff8a6, 0x6, 0xffff, 0x633, 0x8001, r2}, &(0x7f0000000380)=0x20) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) splice(r1, &(0x7f0000000180), r0, &(0x7f00000001c0)=0x5f, 0x7, 0x7) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/attr/exec\x00', 0x2, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f00000003c0)) 00:35:02 executing program 5: clone(0x13102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:35:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000350029080000000000000000030000001800000014000100ffff0000000100000000000000000001"], 0x1}}, 0x0) 00:35:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x40000}], 0x2, 0x0, 0x0) [ 896.360056] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 896.367768] BTRFS error (device loop3): superblock checksum mismatch [ 896.374617] BTRFS error (device loop3): open_ctree failed [ 896.392412] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 896.435285] BTRFS error (device loop3): superblock checksum mismatch 00:35:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 896.489608] BTRFS error (device loop3): open_ctree failed 00:35:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x8000000}], 0x2, 0x0, 0x0) 00:35:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f00000000c0)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x400}) [ 896.614891] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 896.658093] BTRFS error (device loop3): superblock checksum mismatch [ 896.735559] BTRFS error (device loop3): open_ctree failed [ 896.748914] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0xf000000}], 0x2, 0x0, 0x0) 00:35:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x01', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 896.785713] BTRFS error (device loop3): superblock checksum mismatch [ 896.855544] BTRFS error (device loop3): open_ctree failed 00:35:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$packet(0x11, 0x2, 0x300) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000140)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$binfmt_aout(r0, &(0x7f0000000580), 0x20) 00:35:03 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 00:35:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 897.044932] net_ratelimit: 14 callbacks suppressed [ 897.044940] protocol 88fb is buggy, dev hsr_slave_0 [ 897.055009] protocol 88fb is buggy, dev hsr_slave_1 [ 897.168240] device nr0 entered promiscuous mode [ 897.204984] protocol 88fb is buggy, dev hsr_slave_0 [ 897.210171] protocol 88fb is buggy, dev hsr_slave_1 [ 897.284968] protocol 88fb is buggy, dev hsr_slave_0 [ 897.290118] protocol 88fb is buggy, dev hsr_slave_1 [ 897.940468] protocol 88fb is buggy, dev hsr_slave_0 [ 897.945586] protocol 88fb is buggy, dev hsr_slave_1 [ 898.165323] protocol 88fb is buggy, dev hsr_slave_0 [ 898.170801] protocol 88fb is buggy, dev hsr_slave_1 00:35:05 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4000000004, 0x80000000000b, 0x4, 0x0, &(0x7f00000000c0), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x6, 0x8000) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x10000000}], 0x2, 0x0, 0x0) 00:35:05 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = socket$kcm(0x10, 0x2, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x40010003) sendmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f00000110c0)=@can, 0x80, &(0x7f0000012480)=[{&(0x7f0000011140)="2fe9f84e054f49d12031a6ceda8f09fe98b08c9d58337f5a02c29eb633cae7865eae68ee7707b8ba1a0859556e452cb10d8d1b679df8ccb5ec2428f26177b85b84376bec3d96c61b91089449f54358d5f84f", 0x52}, {0x0}], 0x2}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008100e00f80ecdb4cb90453c8650407007400000000fb120003000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x2, &(0x7f0000000140)='!\x00'}, 0x30) recvmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000300)=@ipx, 0x80, &(0x7f0000001700)=[{&(0x7f0000000380)=""/189, 0xbd}, {&(0x7f0000000440)=""/144, 0x90}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/105, 0x69}, {&(0x7f0000001580)=""/65, 0x41}, {&(0x7f0000000080)=""/58, 0x3a}, {&(0x7f0000001600)=""/241, 0xf1}], 0x7, &(0x7f0000000240)=""/41, 0x29}, 0x20) r3 = perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x800000000000, 0x1f, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x3, 0x3, 0x0, 0x2, 0x29d, 0x0, 0x0, 0x5, 0x6, 0x6, 0x8, 0x8000, 0x9, 0x0, 0x0, 0xfffffffffffffe7b, 0xabe3, 0xf929, 0x0, 0x285896eb, 0x4, 0x0, 0x7, 0x5, 0x0, 0xaa3d, 0x0, 0x38000, 0x6, @perf_bp={0x0, 0x8}, 0x200, 0x6, 0x100000001, 0x0, 0x0, 0x7f, 0x7}, 0xffffffffffffffff, 0xd, r0, 0x1) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x8, 0x6, 0x3, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1be, 0x0, 0x5, 0x3, 0x1, 0x4a7e, 0x2, 0x7fff, 0x5, 0x7f, 0x9, 0xffff, 0x5, 0x0, 0x5, 0x80000001, 0x800000, 0x9, 0x0, 0x1, 0x0, 0x2d5, 0x7, 0x2, 0x80, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x80000000}, r2, 0xd, r3, 0xa) 00:35:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/125, 0x7d}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') preadv(r0, &(0x7f00000017c0), 0x3ba, 0x0) [ 898.814685] netlink: 'syz-executor2': attribute type 116 has an invalid length. [ 898.866715] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 898.890530] netlink: 'syz-executor2': attribute type 3 has an invalid length. [ 898.893224] BTRFS error (device loop3): superblock checksum mismatch 00:35:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x47000000}], 0x2, 0x0, 0x0) 00:35:05 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000016c0)=ANY=[@ANYPTR64=&(0x7f0000001540)=ANY=[@ANYBLOB, @ANYRESOCT=r0, @ANYRES64=r0], @ANYRES32=r0, @ANYPTR=&(0x7f00000015c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r0, @ANYPTR=&(0x7f0000001640)=ANY=[], @ANYPTR64, @ANYRES16=r0], 0x3a) ioctl$VIDIOC_G_FREQUENCY(0xffffffffffffffff, 0xc02c5638, &(0x7f0000001740)={0x0, 0x0, 0x2e58}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x280002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) dup3(r1, r0, 0x0) splice(0xffffffffffffffff, &(0x7f0000002a80), 0xffffffffffffffff, &(0x7f0000002ac0), 0x3, 0x6) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0xffffffffffffffdd, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) [ 898.924023] BTRFS error (device loop3): open_ctree failed 00:35:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 898.976230] netlink: 'syz-executor2': attribute type 116 has an invalid length. [ 899.000703] netlink: 'syz-executor2': attribute type 3 has an invalid length. 00:35:05 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = socket$kcm(0x10, 0x2, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x40010003) sendmsg$kcm(r1, &(0x7f00000126c0)={&(0x7f00000110c0)=@can, 0x80, &(0x7f0000012480)=[{&(0x7f0000011140)="2fe9f84e054f49d12031a6ceda8f09fe98b08c9d58337f5a02c29eb633cae7865eae68ee7707b8ba1a0859556e452cb10d8d1b679df8ccb5ec2428f26177b85b84376bec3d96c61b91089449f54358d5f84f", 0x52}, {0x0}], 0x2}, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008100e00f80ecdb4cb90453c8650407007400000000fb120003000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x2, &(0x7f0000000140)='!\x00'}, 0x30) recvmsg$kcm(r1, &(0x7f0000001780)={&(0x7f0000000300)=@ipx, 0x80, &(0x7f0000001700)=[{&(0x7f0000000380)=""/189, 0xbd}, {&(0x7f0000000440)=""/144, 0x90}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/105, 0x69}, {&(0x7f0000001580)=""/65, 0x41}, {&(0x7f0000000080)=""/58, 0x3a}, {&(0x7f0000001600)=""/241, 0xf1}], 0x7, &(0x7f0000000240)=""/41, 0x29}, 0x20) r3 = perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x800000000000, 0x1f, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x3, 0x3, 0x0, 0x2, 0x29d, 0x0, 0x0, 0x5, 0x6, 0x6, 0x8, 0x8000, 0x9, 0x0, 0x0, 0xfffffffffffffe7b, 0xabe3, 0xf929, 0x0, 0x285896eb, 0x4, 0x0, 0x7, 0x5, 0x0, 0xaa3d, 0x0, 0x38000, 0x6, @perf_bp={0x0, 0x8}, 0x200, 0x6, 0x100000001, 0x0, 0x0, 0x7f, 0x7}, 0xffffffffffffffff, 0xd, r0, 0x1) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x8, 0x6, 0x3, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1be, 0x0, 0x5, 0x3, 0x1, 0x4a7e, 0x2, 0x7fff, 0x5, 0x7f, 0x9, 0xffff, 0x5, 0x0, 0x5, 0x80000001, 0x800000, 0x9, 0x0, 0x1, 0x0, 0x2d5, 0x7, 0x2, 0x80, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x80000000}, r2, 0xd, r3, 0xa) [ 899.102659] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x4000000000000}], 0x2, 0x0, 0x0) [ 899.188556] BTRFS error (device loop3): superblock checksum mismatch [ 899.276018] BTRFS error (device loop3): open_ctree failed [ 899.290463] netlink: 'syz-executor2': attribute type 116 has an invalid length. 00:35:05 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f00000016c0)=ANY=[@ANYPTR64=&(0x7f0000001540)=ANY=[@ANYBLOB, @ANYRESOCT=r0, @ANYRES64=r0], @ANYRES32=r0, @ANYPTR=&(0x7f00000015c0)=ANY=[@ANYRES16=0x0], @ANYRESDEC=r0, @ANYPTR=&(0x7f0000001640)=ANY=[], @ANYPTR64, @ANYRES16=r0], 0x3a) ioctl$VIDIOC_G_FREQUENCY(0xffffffffffffffff, 0xc02c5638, &(0x7f0000001740)={0x0, 0x0, 0x2e58}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x280002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) dup3(r1, r0, 0x0) splice(0xffffffffffffffff, &(0x7f0000002a80), 0xffffffffffffffff, &(0x7f0000002ac0), 0x3, 0x6) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0xffffffffffffffdd, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) [ 899.353152] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 899.353532] netlink: 'syz-executor2': attribute type 3 has an invalid length. [ 899.413706] BTRFS error (device loop3): superblock checksum mismatch [ 899.511502] BTRFS error (device loop3): open_ctree failed [ 902.085781] net_ratelimit: 16 callbacks suppressed [ 902.085827] protocol 88fb is buggy, dev hsr_slave_0 [ 902.096417] protocol 88fb is buggy, dev hsr_slave_1 00:35:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x800000000000000}], 0x2, 0x0, 0x0) 00:35:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x01', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x8d0, 0x400080) sendmsg$nl_route(r1, 0x0, 0x4048040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, &(0x7f0000000280)='./bus/../file0\x00', 0x0, 0x7ff, &(0x7f00000002c0)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, &(0x7f0000000680)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) fallocate(r3, 0x1c, 0xe58, 0x8) bind(r2, &(0x7f0000000580)=@ax25={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose, @netrom, @bcast, @bcast, @null]}, 0x80) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000440)={0x0, 0x5, 0x0, 0x2, 0x8}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00L\x00\x00\x00\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 00:35:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:08 executing program 1: epoll_create(0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0xf00000000000000}], 0x2, 0x0, 0x0) [ 902.288387] bond0: Releasing backup interface bond_slave_1 [ 902.334899] protocol 88fb is buggy, dev hsr_slave_0 [ 902.340005] protocol 88fb is buggy, dev hsr_slave_1 00:35:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x1000000000000000}], 0x2, 0x0, 0x0) 00:35:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x4700000000000000}], 0x2, 0x0, 0x0) 00:35:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) 00:35:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) [ 903.285176] protocol 88fb is buggy, dev hsr_slave_0 [ 903.291440] protocol 88fb is buggy, dev hsr_slave_1 [ 903.321150] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 903.370759] bond0: Releasing backup interface bond_slave_1 [ 903.445567] protocol 88fb is buggy, dev hsr_slave_0 [ 903.451364] protocol 88fb is buggy, dev hsr_slave_1 [ 903.525997] protocol 88fb is buggy, dev hsr_slave_0 [ 903.532007] protocol 88fb is buggy, dev hsr_slave_1 [ 903.871027] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:35:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:10 executing program 2: r0 = socket$kcm(0x10, 0x8000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000003d40)={0x0, 0x0, 0x0}, 0x0) [ 904.142603] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 904.179326] BTRFS error (device loop3): superblock checksum mismatch [ 904.234574] BTRFS error (device loop3): open_ctree failed [ 904.298793] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 904.325717] BTRFS error (device loop3): superblock checksum mismatch [ 904.465078] BTRFS error (device loop3): open_ctree failed 00:35:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) close(r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) 00:35:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) 00:35:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:12 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r1, 0x7}, &(0x7f00000001c0)=0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80000, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) [ 906.649351] binder: 23654:23657 transaction failed 29189/-22, size 24-8 line 2896 [ 906.662958] binder: undelivered TRANSACTION_ERROR: 29189 00:35:13 executing program 5: getpid() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x5) r2 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000003c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) dup3(r1, r0, 0x0) [ 906.721122] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 906.736417] BTRFS error (device loop3): superblock checksum mismatch [ 906.745119] BTRFS error (device loop3): open_ctree failed 00:35:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) [ 906.851365] mkiss: ax0: crc mode is auto. [ 906.897655] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 906.927767] BTRFS error (device loop3): superblock checksum mismatch 00:35:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) [ 906.997175] BTRFS error (device loop3): open_ctree failed 00:35:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:13 executing program 5: getpid() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x5) r2 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000003c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) openat$pfkey(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) dup3(r1, r0, 0x0) 00:35:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) 00:35:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 907.402019] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 907.444893] net_ratelimit: 14 callbacks suppressed [ 907.444901] protocol 88fb is buggy, dev hsr_slave_0 [ 907.454943] protocol 88fb is buggy, dev hsr_slave_1 [ 907.472766] BTRFS error (device loop3): superblock checksum mismatch [ 907.528897] mkiss: ax0: crc mode is auto. [ 907.566155] BTRFS error (device loop3): open_ctree failed [ 907.604965] protocol 88fb is buggy, dev hsr_slave_0 [ 907.610103] protocol 88fb is buggy, dev hsr_slave_1 [ 907.684887] protocol 88fb is buggy, dev hsr_slave_0 [ 907.690031] protocol 88fb is buggy, dev hsr_slave_1 [ 907.709846] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) [ 907.765065] BTRFS error (device loop3): superblock checksum mismatch [ 907.996143] BTRFS error (device loop3): open_ctree failed [ 908.214514] audit: type=1400 audit(1547685314.536:111): avc: denied { sys_ptrace } for pid=23694 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 908.324928] protocol 88fb is buggy, dev hsr_slave_0 [ 908.330153] protocol 88fb is buggy, dev hsr_slave_1 [ 908.565620] protocol 88fb is buggy, dev hsr_slave_0 [ 908.571354] protocol 88fb is buggy, dev hsr_slave_1 00:35:16 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000100)={0x0, r1}) 00:35:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:16 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) stat(&(0x7f0000000980)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000ac0)=ANY=[@ANYBLOB], 0x1) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x3d58e726}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) getpgrp(0xffffffffffffffff) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mknod$loop(&(0x7f0000000640)='./bus\x00', 0x40, 0xffffffffffffffff) utime(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000740)) getgroups(0x4, &(0x7f0000000e40)=[0xee01, 0x0, 0xffffffffffffffff, 0xee01]) setsockopt$inet6_mtu(r2, 0x29, 0x17, 0x0, 0xfffffffffffffe67) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000900)={&(0x7f00000ee000/0x3000)=nil, &(0x7f00005e5000/0x4000)=nil, &(0x7f000010e000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f000029b000/0x2000)=nil, &(0x7f00001ba000/0x13000)=nil, &(0x7f0000293000/0x2000)=nil, &(0x7f00005ad000/0x2000)=nil, &(0x7f0000107000/0x9000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00005bf000/0x4000)=nil, 0x0, 0x0, r2}, 0x68) 00:35:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) 00:35:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) [ 909.816566] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 909.854025] BTRFS error (device loop3): superblock checksum mismatch 00:35:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 909.918823] BTRFS error (device loop3): open_ctree failed 00:35:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='maps\x00') preadv(r1, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000180)=""/172, 0xac}, {&(0x7f0000000280)=""/85, 0x55}], 0x3, 0x0) [ 909.978354] audit: type=1800 audit(1547685316.306:112): pid=23780 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor5" name="bus" dev="sda1" ino=17585 res=0 00:35:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) [ 910.053297] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 910.086002] BTRFS error (device loop3): superblock checksum mismatch [ 910.144192] BTRFS error (device loop3): open_ctree failed 00:35:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) lgetxattr(0x0, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}}) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r2, 0x541d) [ 910.242366] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 910.293462] BTRFS error (device loop3): superblock checksum mismatch [ 910.395774] BTRFS error (device loop3): open_ctree failed [ 910.525471] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 910.573475] BTRFS error (device loop3): superblock checksum mismatch [ 910.599916] BTRFS error (device loop3): open_ctree failed [ 910.617007] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 910.651993] BTRFS error (device loop3): superblock checksum mismatch [ 910.759683] BTRFS error (device loop3): open_ctree failed [ 910.885308] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 910.925478] BTRFS error (device loop3): superblock checksum mismatch [ 910.994978] BTRFS error (device loop3): open_ctree failed [ 912.484964] net_ratelimit: 16 callbacks suppressed [ 912.484972] protocol 88fb is buggy, dev hsr_slave_0 [ 912.495047] protocol 88fb is buggy, dev hsr_slave_1 [ 912.724902] protocol 88fb is buggy, dev hsr_slave_0 [ 912.730024] protocol 88fb is buggy, dev hsr_slave_1 00:35:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xfc', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) 00:35:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) pipe2(&(0x7f0000000680), 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x1e9, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_pts(r0, 0x0) 00:35:19 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) connect$llc(r0, &(0x7f0000000180)={0x1a, 0x30d, 0x4, 0x6, 0xab, 0x9, @dev={[], 0x28}}, 0x10) epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10000, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f00000000c0)={0x1, 0x7, 0x9, 0x8}, 0x10) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept$alg(r1, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000100)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, 0x76}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) [ 913.328535] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 913.355639] BTRFS error (device loop3): superblock checksum mismatch [ 913.387857] BTRFS error (device loop3): open_ctree failed 00:35:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) 00:35:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xfd', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 913.685412] protocol 88fb is buggy, dev hsr_slave_0 [ 913.691683] protocol 88fb is buggy, dev hsr_slave_1 [ 913.789832] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 913.825629] BTRFS error (device loop3): superblock checksum mismatch 00:35:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) [ 913.844936] protocol 88fb is buggy, dev hsr_slave_0 [ 913.850106] protocol 88fb is buggy, dev hsr_slave_1 00:35:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x7f', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 913.887761] BTRFS error (device loop3): open_ctree failed [ 913.924928] protocol 88fb is buggy, dev hsr_slave_0 [ 913.930057] protocol 88fb is buggy, dev hsr_slave_1 00:35:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) [ 914.022247] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 914.078353] BTRFS error (device loop3): superblock checksum mismatch [ 914.196969] BTRFS error (device loop3): open_ctree failed 00:35:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) 00:35:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) 00:35:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x03', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x8c', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:22 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000000c0)={{0x7, 0x7, 0x9130, 0x0, '\x00', 0x4}, 0x0, [0x6, 0x1f, 0x3ca3, 0x3, 0x0, 0x7, 0x3, 0x4, 0x0, 0x8, 0x4, 0x8, 0x4, 0x7ff, 0x1, 0x6, 0x40, 0x3, 0x6, 0xbc, 0x8, 0x2, 0xfffffffffffffffa, 0x3, 0xf4, 0x4, 0x0, 0x3, 0x9, 0x1, 0x6, 0x7, 0x5, 0x100000000, 0x8001, 0x3, 0x0, 0x80000000, 0x100, 0x80000001, 0x9, 0x4, 0x532, 0x4, 0xdd3, 0x20, 0x1000, 0x1, 0x3, 0xd3, 0x40, 0x8, 0x1, 0x401, 0x7, 0x9, 0x40, 0x41, 0xe5, 0x7, 0x5, 0x7ff, 0xfffffffffffffff8, 0x9, 0x5, 0x342, 0x5, 0x1000, 0xf002, 0x6, 0x1, 0x73c31902, 0x5, 0x3, 0xc13, 0x9a7, 0xd6, 0x7ff, 0x8, 0x0, 0xc8, 0x87, 0x0, 0xffffffff, 0x82a, 0x8, 0x4, 0x952, 0xfffffffffffffffa, 0x617c, 0x8377, 0x8, 0x100, 0x1, 0x6, 0xa, 0xf3, 0x58b6, 0x10001, 0xf94, 0xff, 0x7, 0x0, 0x8c, 0x8001, 0x0, 0x2, 0x3, 0xcdd, 0x48000, 0x2, 0x80000000, 0x3, 0x6, 0x2, 0x2, 0x0, 0x7, 0x2, 0x8001, 0xffffffffffffffc0, 0x0, 0x6, 0x6, 0x8ad2, 0x6, 0xd66, 0x101], {0x77359400}}) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}, 0x0}], 0x2, 0x0, 0x0) 00:35:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000bc0)='./file0\x00') r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) 00:35:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x02', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x97', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) 00:35:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x4, 0x0) 00:35:22 executing program 5: r0 = gettid() perf_event_open(0xfffffffffffffffe, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, 0x0}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000480)={r1, 0x0, 0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) 00:35:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x03', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x8, 0x0) 00:35:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xf4', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) [ 917.073911] FAT-fs (loop5): invalid media value (0x00) [ 917.079988] FAT-fs (loop5): Can't find a valid FAT filesystem [ 917.844946] net_ratelimit: 14 callbacks suppressed [ 917.844954] protocol 88fb is buggy, dev hsr_slave_0 [ 917.855031] protocol 88fb is buggy, dev hsr_slave_1 [ 918.004961] protocol 88fb is buggy, dev hsr_slave_0 [ 918.010090] protocol 88fb is buggy, dev hsr_slave_1 [ 918.084919] protocol 88fb is buggy, dev hsr_slave_0 [ 918.090075] protocol 88fb is buggy, dev hsr_slave_1 00:35:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x03', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0xf, 0x0) 00:35:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) 00:35:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xf5', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:24 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10001, 0x80000) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lgetxattr(0x0, 0x0, 0x0, 0x0) 00:35:24 executing program 5: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000600)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x811}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) recvmsg$kcm(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)=""/4096, 0x1000, 0x8}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)='th\x89\x06aded\x00', 0xfdef) 00:35:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x10, 0x0) 00:35:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xf6', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 918.724915] protocol 88fb is buggy, dev hsr_slave_0 [ 918.730024] protocol 88fb is buggy, dev hsr_slave_1 00:35:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x03', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x47, 0x0) [ 918.868931] device nr0 entered promiscuous mode 00:35:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0xf00, 0x0) [ 918.964933] protocol 88fb is buggy, dev hsr_slave_0 [ 918.970108] protocol 88fb is buggy, dev hsr_slave_1 00:35:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xc0', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xfb', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x4700, 0x0) 00:35:27 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8000, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x40000, 0x0) 00:35:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x02', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xfd', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:27 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) pipe2(&(0x7f0000000680), 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) write$selinux_user(r0, &(0x7f0000000040)={'u:r:untrusted_app:s0:c512,c768', 0x20, 'system_u\x00'}, 0x28) 00:35:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x8000000, 0x0) 00:35:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0xf000000, 0x0) 00:35:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x10000000, 0x0) [ 921.733865] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x0f', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 921.780103] BTRFS error (device loop3): superblock checksum mismatch [ 921.875600] BTRFS error (device loop3): open_ctree failed [ 922.885169] net_ratelimit: 16 callbacks suppressed [ 922.885216] protocol 88fb is buggy, dev hsr_slave_0 [ 922.895656] protocol 88fb is buggy, dev hsr_slave_1 [ 923.134913] protocol 88fb is buggy, dev hsr_slave_0 [ 923.140014] protocol 88fb is buggy, dev hsr_slave_1 00:35:29 executing program 1: epoll_create(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000000)='-:}+\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) tgkill(r0, r1, 0x3b) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000000140), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x47000000, 0x0) 00:35:29 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x2) preadv(r0, &(0x7f0000001500)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x0) 00:35:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xf4', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:29 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgrp(0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r3}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) fsync(r1) fsetxattr$security_ima(r0, &(0x7f0000000540)='security.ima\x00', &(0x7f0000000680)=@sha1={0x1, "4aa2df02b6a29a861503161ef91c0ad49064aa81"}, 0x15, 0x2) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000280)={0x6}) ioctl$SIOCX25SCALLUSERDATA(r5, 0x89e5, &(0x7f00000005c0)={0x7c, "7f788319b6079a7483faead77a3980f192c79b1776390a177a2c446bbe753f1fc0427a5361300433db9c03a00a6bed8e34fef07c09c4fb3c5435de6cd47a2e82faa947ab3dabb392e009872f7457a57554d761875b0bd588e970b40cbc31d940e35fbb13cdc82b9ab935350f2f4451376814eee94316133422ae7b0b3e1864b8"}) ptrace$setregset(0x4205, r3, 0x201, &(0x7f0000000240)={&(0x7f0000000740)="eee831c4c55ec237f036e607532e6be515e0ff59eb07ca967784d01655a33a563c297579808c05c2a32773aa52580871a379712644cd3fe309a095938a2699f285daf00f0c5072970a04d508e74dce8d091b9a0d946312e9543ffaf5c41d7507c95443fb0c4d26a2411c4684267a142a2db6dc35d80807e4b29643daa044b555ae0533296509e0fda89f", 0x8a}) ioctl$int_in(r4, 0x5452, &(0x7f0000000580)=0xe2e) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000340)={0x800000001, 0x0, 0x5, 0xffffffff80000000}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000000c0), &(0x7f00000002c0)=0x4) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) io_cancel(0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r5, r6, &(0x7f0000d83ff8), 0x8000fffffffe) [ 923.568156] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x4000000000000, 0x0) [ 923.609850] BTRFS error (device loop3): superblock checksum mismatch 00:35:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 923.706960] BTRFS error (device loop3): open_ctree failed 00:35:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x800000000000000, 0x0) [ 923.873479] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0xf00000000000000, 0x0) [ 923.977039] BTRFS error (device loop3): superblock checksum mismatch [ 924.005190] BTRFS error (device loop3): open_ctree failed [ 924.055409] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 924.084924] protocol 88fb is buggy, dev hsr_slave_0 [ 924.090102] protocol 88fb is buggy, dev hsr_slave_1 00:35:30 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgrp(0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) capget(&(0x7f00000001c0)={0x20080522, r3}, &(0x7f0000000200)={0x9, 0x81, 0xffffffff, 0x6, 0x3ff, 0x8001}) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) fsync(r1) fsetxattr$security_ima(r0, &(0x7f0000000540)='security.ima\x00', &(0x7f0000000680)=@sha1={0x1, "4aa2df02b6a29a861503161ef91c0ad49064aa81"}, 0x15, 0x2) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000280)={0x6}) ioctl$SIOCX25SCALLUSERDATA(r5, 0x89e5, &(0x7f00000005c0)={0x7c, "7f788319b6079a7483faead77a3980f192c79b1776390a177a2c446bbe753f1fc0427a5361300433db9c03a00a6bed8e34fef07c09c4fb3c5435de6cd47a2e82faa947ab3dabb392e009872f7457a57554d761875b0bd588e970b40cbc31d940e35fbb13cdc82b9ab935350f2f4451376814eee94316133422ae7b0b3e1864b8"}) ptrace$setregset(0x4205, r3, 0x201, &(0x7f0000000240)={&(0x7f0000000740)="eee831c4c55ec237f036e607532e6be515e0ff59eb07ca967784d01655a33a563c297579808c05c2a32773aa52580871a379712644cd3fe309a095938a2699f285daf00f0c5072970a04d508e74dce8d091b9a0d946312e9543ffaf5c41d7507c95443fb0c4d26a2411c4684267a142a2db6dc35d80807e4b29643daa044b555ae0533296509e0fda89f", 0x8a}) ioctl$int_in(r4, 0x5452, &(0x7f0000000580)=0xe2e) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000340)={0x800000001, 0x0, 0x5, 0xffffffff80000000}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000000c0), &(0x7f00000002c0)=0x4) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) io_cancel(0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r5, r6, &(0x7f0000d83ff8), 0x8000fffffffe) [ 924.105176] BTRFS error (device loop3): superblock checksum mismatch [ 924.232387] BTRFS error (device loop3): open_ctree failed [ 924.244943] protocol 88fb is buggy, dev hsr_slave_0 [ 924.250043] protocol 88fb is buggy, dev hsr_slave_1 [ 924.324911] protocol 88fb is buggy, dev hsr_slave_0 [ 924.330004] protocol 88fb is buggy, dev hsr_slave_1 00:35:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x1000000000000000, 0x0) 00:35:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:31 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) stat(&(0x7f0000000980)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) getpgrp(0xffffffffffffffff) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) mknod$loop(&(0x7f0000000640)='./bus\x00', 0x40, 0xffffffffffffffff) utime(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000e40)=[0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee00]) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000900)={&(0x7f00000ee000/0x3000)=nil, &(0x7f00005e5000/0x4000)=nil, &(0x7f000010e000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f000029b000/0x2000)=nil, &(0x7f00001ba000/0x13000)=nil, &(0x7f0000293000/0x2000)=nil, &(0x7f00005ad000/0x2000)=nil, &(0x7f0000107000/0x9000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00005bf000/0x4000)=nil, 0x0, 0x0, r2}, 0x68) 00:35:31 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x4700000000000000, 0x0) [ 924.814649] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 924.851967] BTRFS error (device loop3): superblock checksum mismatch [ 924.909362] BTRFS error (device loop3): open_ctree failed 00:35:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@initdev}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) getgid() openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) [ 924.958420] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x91', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 925.026363] BTRFS error (device loop3): superblock checksum mismatch [ 925.050869] BTRFS error (device loop3): open_ctree failed 00:35:31 executing program 5: seccomp(0x200000001, 0x0, &(0x7f0000016000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffff7ff00000}]}) [ 925.210729] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 925.236909] BTRFS error (device loop3): superblock checksum mismatch 00:35:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x6404000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=@deltaction={0x1a4, 0x31, 0xf09, 0x70bd27, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x4, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x14, 0xf, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0x10, 0x10, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x51}}, {0x10, 0x7, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x1a, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x94, 0x1, [{0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x3, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x14, 0x9, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}, {0x14, 0x1d, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}]}, @TCA_ACT_TAB={0x80, 0x1, [{0x10, 0x3, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x14, 0x11, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x1d, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x1b, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x14, 0x11, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x20000000}, 0x814) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:35:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x92', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 925.336883] BTRFS error (device loop3): open_ctree failed 00:35:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:31 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:35:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 925.706812] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x93', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 925.785006] BTRFS error (device loop3): superblock checksum mismatch [ 925.795895] BTRFS error (device loop3): open_ctree failed [ 925.973381] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 925.983940] BTRFS error (device loop3): superblock checksum mismatch [ 926.097232] BTRFS error (device loop3): open_ctree failed 00:35:33 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfff, 0x101000) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f00000000c0)={{0xffffffffffffff4d, 0x0, 0x80, 0x0, 0x7f, 0x3}}) r1 = epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) rt_tgsigqueueinfo(r2, r3, 0x17, &(0x7f0000000180)={0x26, 0xffffffffe6fc059f}) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000100)={0x4, "0cd0a7120f882dabd89c33d588ff5482da70657b9fedca0eb6b71630907566e6", 0x3, 0x3ff, 0x5, 0xb700, 0x2}) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) accept$nfc_llcp(r2, 0x0, &(0x7f0000000180)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000300)={r3, @in={{0x2, 0x4e21, @loopback}}, 0x81, 0x6, 0x6, 0x80, 0x6}, &(0x7f00000003c0)=0x98) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000480)=""/34) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000200)=""/172) setsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f00000001c0)=0x81, 0x4) 00:35:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x94', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:33 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) 00:35:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 927.520170] binder: binder_mmap: 24390 20ffc000-20fff000 bad vm_flags failed -1 00:35:33 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) 00:35:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0xfffffffffffffe73) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000100)='./file0\x00', r3, r4) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x400) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [], {}, [{0x8, 0x2}, {0x8, 0x0, r4}, {0x8, 0x2, r4}, {0x8, 0x4, r4}, {}], {0x10, 0x2}}, 0x4c, 0x1) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={@local, @empty, @mcast2, 0x0, 0x78}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r5 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) r6 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x4, 0x20080) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r6, 0xc058565d, &(0x7f0000000340)={0x3, 0x6, 0x4, 0x2000000, {r7, r8/1000+10000}, {0x4, 0xc, 0x5, 0xeb, 0x101, 0x3ff, "e078ae42"}, 0x0, 0x4, @userptr, 0x4}) [ 927.717112] binder: binder_mmap: 24417 20ffc000-20fff000 bad vm_flags failed -1 00:35:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x95', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:34 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) [ 928.063202] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 928.100322] binder: binder_mmap: 24440 20ffc000-20fff000 bad vm_flags failed -1 00:35:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 928.145988] BTRFS error (device loop3): superblock checksum mismatch [ 928.244898] net_ratelimit: 14 callbacks suppressed [ 928.244905] protocol 88fb is buggy, dev hsr_slave_0 [ 928.254982] protocol 88fb is buggy, dev hsr_slave_1 [ 928.285677] BTRFS error (device loop3): open_ctree failed [ 928.405009] protocol 88fb is buggy, dev hsr_slave_0 [ 928.410221] protocol 88fb is buggy, dev hsr_slave_1 [ 928.484907] protocol 88fb is buggy, dev hsr_slave_0 [ 928.490026] protocol 88fb is buggy, dev hsr_slave_1 [ 929.124935] protocol 88fb is buggy, dev hsr_slave_0 [ 929.130055] protocol 88fb is buggy, dev hsr_slave_1 [ 929.364906] protocol 88fb is buggy, dev hsr_slave_0 [ 929.370006] protocol 88fb is buggy, dev hsr_slave_1 00:35:37 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) 00:35:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x96', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000100)={@mcast2}, &(0x7f0000000140)=0x14) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_LOG_STATUS(r3, 0x5646, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:35:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:37 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x19, 0x80200) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000140)={0x85df89a5, &(0x7f0000000240)="e587dea54d00181ab9788e9af982404ea2ea6db060fb96a7f32555ca0e792bf9553f22303720670d8404c0489327b7a7c9a99bad8ca6b9a327430ef1bb66e504b28534601e935bc58747ce2fe82619765d014c3f0203770800000065079f0fb946ec95244d7d425f4da2d8a5952ac88d04cfa2aa13f751dc6acdf30e7d44f2f3ea612147dfdeeb148a97ea00f8f22f3824929c0576918454ba5bf18042d601e717ba955714e2fe53ecb604e5e1"}) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 930.949716] binder: binder_mmap: 24464 20ffc000-20fff000 bad vm_flags failed -1 00:35:37 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) [ 931.053029] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000057c0)=[{{&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)=""/247, 0xf7}], 0x1}, 0x1ff}, {{&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/92, 0x5c}, {&(0x7f0000000480)=""/211, 0xd3}, {&(0x7f0000000340)=""/58, 0x3a}], 0x3}, 0x100000000}, {{&(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000740)=""/99, 0x63}, {&(0x7f00000003c0)=""/59, 0x3b}, {&(0x7f0000000600)=""/17, 0x11}, {&(0x7f00000007c0)=""/124, 0x7c}, {&(0x7f0000000680)=""/25, 0x19}, {&(0x7f0000000840)=""/201, 0xc9}], 0x6, &(0x7f00000009c0)=""/4096, 0x1000}, 0x6}, {{&(0x7f00000019c0), 0x80, &(0x7f0000002f00)=[{&(0x7f0000001a40)=""/214, 0xd6}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/2, 0x2}, {&(0x7f0000002b80)=""/129, 0x81}, {&(0x7f0000002c40)=""/63, 0x3f}, {&(0x7f0000002c80)=""/12, 0xc}, {&(0x7f0000002cc0)=""/198, 0xc6}, {&(0x7f0000002dc0)=""/71, 0x47}, {&(0x7f0000002e40)=""/176, 0xb0}], 0x9, &(0x7f0000002fc0)=""/1, 0x1}, 0x80000000}, {{&(0x7f0000003000)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000003180)=[{&(0x7f0000003080)=""/131, 0x83}, {&(0x7f0000003140)=""/43, 0x2b}], 0x2}, 0x7fff}, {{&(0x7f00000031c0)=@alg, 0x80, &(0x7f0000004580)=[{&(0x7f0000003240)=""/132, 0x84}, {&(0x7f0000003300)=""/110, 0x6e}, {&(0x7f0000003380)=""/247, 0xf7}, {&(0x7f0000003480)}, {&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)=""/113, 0x71}, {&(0x7f0000004540)=""/50, 0x32}], 0x7, &(0x7f0000004600)=""/4096, 0x1000}}, {{&(0x7f0000005600)=@nfc, 0x80, &(0x7f0000005740)=[{&(0x7f0000005680)=""/183, 0xb7}], 0x1, &(0x7f0000005780)}, 0x101}], 0x7, 0x40000000, &(0x7f0000005980)) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:35:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x97', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 931.098520] BTRFS error (device loop3): superblock checksum mismatch [ 931.165791] BTRFS error (device loop3): open_ctree failed [ 931.251859] binder: binder_mmap: 24490 20ffc000-20fff000 bad vm_flags failed -1 00:35:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1, 0x0, 0xfffffffffffffe4b}}], 0x1, 0x0, 0x0) 00:35:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x98', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 931.322282] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:37 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) [ 931.374937] BTRFS error (device loop3): superblock checksum mismatch [ 931.457172] BTRFS error (device loop3): open_ctree failed 00:35:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x99', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0xd85, 0xf5c, 0x5, 0xdb, 0x6, [{0x8, 0xc591, 0xfffffffffffffff9, 0x0, 0x0, 0x8}, {0x9, 0x209, 0x3, 0x0, 0x0, 0x80}, {0x0, 0x5, 0xcd0, 0x0, 0x0, 0x2000}, {0x9, 0xffff, 0x8, 0x0, 0x0, 0x800}, {0x9, 0x4, 0x0, 0x0, 0x0, 0x1000}, {0x4, 0x800, 0xcc1, 0x0, 0x0, 0x1804}]}) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 931.538581] binder: binder_mmap: 24511 20ffc000-20fff000 bad vm_flags failed -1 00:35:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 931.764748] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 931.827939] BTRFS error (device loop3): superblock checksum mismatch [ 931.945709] BTRFS error (device loop3): open_ctree failed [ 933.284902] net_ratelimit: 16 callbacks suppressed [ 933.284910] protocol 88fb is buggy, dev hsr_slave_0 [ 933.294983] protocol 88fb is buggy, dev hsr_slave_1 [ 933.524952] protocol 88fb is buggy, dev hsr_slave_0 [ 933.530094] protocol 88fb is buggy, dev hsr_slave_1 00:35:40 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) r0 = socket$isdn(0x22, 0x3, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:40 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) 00:35:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x3, 0x20080) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18, 0x71, 0x1, {{0x40, 0x1, 0x8}}}, 0x18) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 00:35:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x9a', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 933.741203] binder: binder_mmap: 24549 20ffc000-20fff000 bad vm_flags failed -1 00:35:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x9b', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 933.784769] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 933.825145] BTRFS error (device loop3): superblock checksum mismatch 00:35:40 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) [ 933.896053] BTRFS error (device loop3): open_ctree failed 00:35:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) open(0x0, 0x8000, 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)}, 0x2}], 0x2, 0x0, 0x0) [ 934.066368] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 934.090049] binder: binder_mmap: 24586 20ffc000-20fff000 bad vm_flags failed -1 [ 934.121229] BTRFS error (device loop3): superblock checksum mismatch [ 934.245942] BTRFS error (device loop3): open_ctree failed [ 934.484955] protocol 88fb is buggy, dev hsr_slave_0 [ 934.490063] protocol 88fb is buggy, dev hsr_slave_1 [ 934.644941] protocol 88fb is buggy, dev hsr_slave_0 [ 934.650215] protocol 88fb is buggy, dev hsr_slave_1 [ 934.724928] protocol 88fb is buggy, dev hsr_slave_0 [ 934.730037] protocol 88fb is buggy, dev hsr_slave_1 00:35:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x9c', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000140)) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x3, &(0x7f00000000c0)={{r2, r3/1000+30000}, {0x0, 0x7530}}, &(0x7f0000000100)) 00:35:42 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) 00:35:42 executing program 1: epoll_create(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000000c0)={'filter\x00', 0x25, "2dcc8a431bfca18179ef635b5a08d2f54bd24dae8196e6c10b750c4e4dfbce23f305b962c8"}, &(0x7f0000000000)=0x49) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x8201, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) ioctl$TCSETS(r1, 0x40045431, 0x0) 00:35:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 935.722742] binder: binder_mmap: 24605 20ffc000-20fff000 bad vm_flags failed -1 [ 935.752857] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x9, 0x4) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 00:35:42 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) [ 935.781206] BTRFS error (device loop3): superblock checksum mismatch [ 935.875640] BTRFS error (device loop3): open_ctree failed [ 935.936842] binder: binder_mmap: 24629 20ffc000-20fff000 bad vm_flags failed -1 00:35:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x9d', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x1, 0x5, 0x81, 0x7ff, 0x0, 0x7, 0xc25, 0x1000, 0x8, 0xfffffffffffffff9, 0x2c0}, 0xb) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x1, 0x6770, 0x4, 0x7, 0x0, 0x1f, 0x400, 0x4, 0x9, 0xfffffffffffffff9, 0x6, 0x8, 0x3f, 0xfffffffffffffc00, 0x0, 0x1, 0xdf8, 0x4, 0x1f, 0x81, 0x2, 0xfff, 0x8001, 0x8001, 0xff, 0x7, 0x62, 0x445, 0x5, 0x0, 0x10000, 0xffffffff, 0x0, 0x6, 0xb8f, 0x7, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x8009, 0x3, 0x40, 0x1, 0x3, 0x5, 0x1000}, r2, 0x10, 0xffffffffffffff9c, 0x8) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:35:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) 00:35:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:35:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) 00:35:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:44 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) socket$inet_dccp(0x2, 0x6, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x9e', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) 00:35:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xcc, r2, 0xc, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf994}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffff8000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x380000000000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x1e}}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5d}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11, 0x11}}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200001, 0x0) ioctl$GIO_CMAP(r4, 0x4b70, &(0x7f00000000c0)) recvmmsg(r3, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:35:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SVE_SET_VL(0x32, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f00000000c0)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 938.278317] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:44 executing program 5: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) 00:35:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 938.338577] BTRFS error (device loop3): superblock checksum mismatch [ 938.402566] BTRFS error (device loop3): open_ctree failed 00:35:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@null=' \x00', 0x7, 'bcsf0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) 00:35:44 executing program 5: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) [ 938.568345] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 938.633350] BTRFS error (device loop3): superblock checksum mismatch [ 938.644898] net_ratelimit: 14 callbacks suppressed [ 938.644906] protocol 88fb is buggy, dev hsr_slave_0 [ 938.654938] protocol 88fb is buggy, dev hsr_slave_1 [ 938.682724] BTRFS error (device loop3): open_ctree failed 00:35:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) r1 = dup3(r0, r0, 0x80000) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x2000800, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xffff}}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7fff}}], [{@obj_user={'obj_user', 0x3d, 'skcipher\x00'}}, {@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@obj_role={'obj_role', 0x3d, '{loem1#'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x800}}, {@obj_user={'obj_user', 0x3d, 'kw(tnepres)\x00'}}, {@audit='audit'}]}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 938.709248] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 938.775955] BTRFS error (device loop3): superblock checksum mismatch [ 938.804963] protocol 88fb is buggy, dev hsr_slave_0 [ 938.810073] protocol 88fb is buggy, dev hsr_slave_1 [ 938.879902] BTRFS error (device loop3): open_ctree failed [ 938.885264] protocol 88fb is buggy, dev hsr_slave_0 [ 938.890938] protocol 88fb is buggy, dev hsr_slave_1 [ 939.010448] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 939.038622] BTRFS error (device loop3): superblock checksum mismatch [ 939.137965] BTRFS error (device loop3): open_ctree failed [ 939.524984] protocol 88fb is buggy, dev hsr_slave_0 [ 939.530083] protocol 88fb is buggy, dev hsr_slave_1 [ 939.765157] protocol 88fb is buggy, dev hsr_slave_0 [ 939.770781] protocol 88fb is buggy, dev hsr_slave_1 00:35:47 executing program 5: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) 00:35:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 00:35:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:47 executing program 1: epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400800, 0x0) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 941.692110] BTRFS error (device loop3): unsupported checksum algorithm 20952 00:35:48 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) 00:35:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(lrw(serpent),wp512-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}, 0x7}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000080)=""/71, 0x6}], 0x1, 0x0, 0xfffffffffffffcd0}}], 0x2, 0x0, 0x0) [ 941.734189] BTRFS error (device loop3): superblock checksum mismatch [ 941.743667] BTRFS error (device loop3): open_ctree failed [ 941.756494] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 941.826051] BTRFS error (device loop3): superblock checksum mismatch 00:35:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 941.867153] binder: binder_mmap: 24782 20ffc000-20fff000 bad vm_flags failed -1 00:35:48 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) [ 941.952414] BTRFS error (device loop3): open_ctree failed 00:35:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x5, 0x100) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000100)={0x2, 0x9, 0x81}) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x3000}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) fcntl$getown(r0, 0x9) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x400035f, 0x0, 0x0) 00:35:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 942.084156] binder: binder_mmap: 24798 20ffc000-20fff000 bad vm_flags failed -1 00:35:48 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) [ 942.198664] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 942.242569] BTRFS error (device loop3): superblock checksum mismatch [ 942.275800] BTRFS error (device loop3): open_ctree failed [ 942.313467] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 942.344983] BTRFS error (device loop3): superblock checksum mismatch 00:35:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x100, 0x40000) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) personality(0xa00000) r2 = accept4(r0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)={0xdb0}, 0x8) recvmmsg(r2, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) [ 942.362376] binder: binder_mmap: 24817 20ffc000-20fff000 bad vm_flags failed -1 [ 942.370246] BTRFS error (device loop3): open_ctree failed 00:35:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 942.685577] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 942.719152] BTRFS error (device loop3): superblock checksum mismatch [ 942.757368] BTRFS error (device loop3): open_ctree failed [ 942.870959] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 942.909010] BTRFS error (device loop3): superblock checksum mismatch [ 942.945703] BTRFS error (device loop3): open_ctree failed [ 943.685128] net_ratelimit: 16 callbacks suppressed [ 943.685152] protocol 88fb is buggy, dev hsr_slave_0 [ 943.695537] protocol 88fb is buggy, dev hsr_slave_1 [ 943.924876] protocol 88fb is buggy, dev hsr_slave_0 [ 943.929960] protocol 88fb is buggy, dev hsr_slave_1 00:35:50 executing program 1: r0 = epoll_create(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f0000000000)=0x1, 0xc, 0xfffffffffffffffe, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000)=0x3, 0x2) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) 00:35:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) 00:35:50 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) 00:35:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfsk', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:35:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(tnepres)\x00'}, 0x58) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000040)='<', 0x1}], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) close(r2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x20000, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x80000) recvmmsg(r3, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/71, 0x47}], 0x1}}], 0x2, 0x0, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000080)="faab9bdd0e1a096d1faf1d5360946091") 00:35:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 944.671983] binder: binder_mmap: 24857 20ffc000-20fff000 bad vm_flags failed -1 [ 944.710013] BTRFS error (device loop3): unsupported checksum algorithm 20952 [ 944.725091] BTRFS error (device loop3): superblock checksum mismatch 00:35:51 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000006, 0x12, r0, 0x0) 00:35:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4abbe72ad37214378444f3f17335f3ae9784cd921ca5c27e8c5688d44e1c04cd73fb7b08fdadb115efb7afded26c076585bf795db010000009ca20e024a6302985cd2ff3ac7f9bafd2d8226b916f309940113db26b562d9025d26b55252ef87a73bca872688c3dfd814671e0b82256cdbc5bb15dffc79a9dfd8511b7a1c46", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 944.776492] BTRFS error (device loop3): open_ctree failed [ 944.884955] protocol 88fb is buggy, dev hsr_slave_0 [ 944.891124] protocol 88fb is buggy, dev hsr_slave_1 00:35:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000640)="8da436050000000006000000000b004d01000000000000000000000000000000ecf6f2a2299748ae1f0800d01424f03c000001000000000001000000102000005f42485266535f4d3b303ac4ab", 0x4d, 0x10000}], 0x0, 0x0) [ 945.045898] protocol 88fb is buggy, dev hsr_slave_0 [ 945.051766] protocol 88fb is buggy, dev hsr_slave_1 [ 945.124939] protocol 88fb is buggy, dev hsr_slave_0 [ 945.130115] protocol 88fb is buggy, dev hsr_slave_1 00:35:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000100)={0x1b7, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:35:53 executing program 1: epoll_create(0x100) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) [ 949.044927] net_ratelimit: 14 callbacks suppressed [ 949.044933] protocol 88fb is buggy, dev hsr_slave_0 [ 949.054997] protocol 88fb is buggy, dev hsr_slave_1 [ 949.204953] protocol 88fb is buggy, dev hsr_slave_0 [ 949.210038] protocol 88fb is buggy, dev hsr_slave_1 [ 949.284911] protocol 88fb is buggy, dev hsr_slave_0 [ 949.289978] protocol 88fb is buggy, dev hsr_slave_1 [ 949.924908] protocol 88fb is buggy, dev hsr_slave_0 [ 949.929991] protocol 88fb is buggy, dev hsr_slave_1 [ 950.164877] protocol 88fb is buggy, dev hsr_slave_0 [ 950.169964] protocol 88fb is buggy, dev hsr_slave_1 [ 954.084913] net_ratelimit: 16 callbacks suppressed [ 954.089890] protocol 88fb is buggy, dev hsr_slave_0 [ 954.095005] protocol 88fb is buggy, dev hsr_slave_1 [ 954.324884] protocol 88fb is buggy, dev hsr_slave_0 [ 954.330001] protocol 88fb is buggy, dev hsr_slave_1 [ 955.284922] protocol 88fb is buggy, dev hsr_slave_0 [ 955.290040] protocol 88fb is buggy, dev hsr_slave_1 [ 955.444954] protocol 88fb is buggy, dev hsr_slave_0 [ 955.450042] protocol 88fb is buggy, dev hsr_slave_1 [ 955.524955] protocol 88fb is buggy, dev hsr_slave_0 [ 955.530044] protocol 88fb is buggy, dev hsr_slave_1 [ 959.444925] net_ratelimit: 14 callbacks suppressed [ 959.449900] protocol 88fb is buggy, dev hsr_slave_0 [ 959.454987] protocol 88fb is buggy, dev hsr_slave_1 [ 959.604953] protocol 88fb is buggy, dev hsr_slave_0 [ 959.610221] protocol 88fb is buggy, dev hsr_slave_1 [ 959.684952] protocol 88fb is buggy, dev hsr_slave_0 [ 959.690126] protocol 88fb is buggy, dev hsr_slave_1 [ 960.324924] protocol 88fb is buggy, dev hsr_slave_0 [ 960.330049] protocol 88fb is buggy, dev hsr_slave_1 [ 960.564900] protocol 88fb is buggy, dev hsr_slave_0 [ 960.570134] protocol 88fb is buggy, dev hsr_slave_1 [ 964.484950] net_ratelimit: 16 callbacks suppressed [ 964.490052] protocol 88fb is buggy, dev hsr_slave_0 [ 964.495110] protocol 88fb is buggy, dev hsr_slave_1 [ 964.724910] protocol 88fb is buggy, dev hsr_slave_0 [ 964.730031] protocol 88fb is buggy, dev hsr_slave_1 [ 965.685009] protocol 88fb is buggy, dev hsr_slave_0 [ 965.690163] protocol 88fb is buggy, dev hsr_slave_1 [ 965.844968] protocol 88fb is buggy, dev hsr_slave_0 [ 965.850154] protocol 88fb is buggy, dev hsr_slave_1 [ 965.924936] protocol 88fb is buggy, dev hsr_slave_0 [ 965.930023] protocol 88fb is buggy, dev hsr_slave_1 [ 969.844967] net_ratelimit: 14 callbacks suppressed [ 969.850063] protocol 88fb is buggy, dev hsr_slave_0 [ 969.855132] protocol 88fb is buggy, dev hsr_slave_1 [ 970.004952] protocol 88fb is buggy, dev hsr_slave_0 [ 970.010120] protocol 88fb is buggy, dev hsr_slave_1 [ 970.085046] protocol 88fb is buggy, dev hsr_slave_0 [ 970.090153] protocol 88fb is buggy, dev hsr_slave_1 [ 970.724980] protocol 88fb is buggy, dev hsr_slave_0 [ 970.730295] protocol 88fb is buggy, dev hsr_slave_1 [ 970.964903] protocol 88fb is buggy, dev hsr_slave_0 [ 970.970039] protocol 88fb is buggy, dev hsr_slave_1 [ 974.884934] net_ratelimit: 16 callbacks suppressed [ 974.884941] protocol 88fb is buggy, dev hsr_slave_0 [ 974.895039] protocol 88fb is buggy, dev hsr_slave_1 [ 975.124909] protocol 88fb is buggy, dev hsr_slave_0 [ 975.130180] protocol 88fb is buggy, dev hsr_slave_1 [ 976.084920] protocol 88fb is buggy, dev hsr_slave_0 [ 976.090035] protocol 88fb is buggy, dev hsr_slave_1 [ 976.244958] protocol 88fb is buggy, dev hsr_slave_0 [ 976.250066] protocol 88fb is buggy, dev hsr_slave_1 [ 976.324968] protocol 88fb is buggy, dev hsr_slave_0 [ 976.330144] protocol 88fb is buggy, dev hsr_slave_1 [ 980.244969] net_ratelimit: 14 callbacks suppressed [ 980.249959] protocol 88fb is buggy, dev hsr_slave_0 [ 980.255064] protocol 88fb is buggy, dev hsr_slave_1 [ 980.405105] protocol 88fb is buggy, dev hsr_slave_0 [ 980.410253] protocol 88fb is buggy, dev hsr_slave_1 [ 980.485031] protocol 88fb is buggy, dev hsr_slave_0 [ 980.490155] protocol 88fb is buggy, dev hsr_slave_1 [ 981.124924] protocol 88fb is buggy, dev hsr_slave_0 [ 981.130058] protocol 88fb is buggy, dev hsr_slave_1 [ 981.364907] protocol 88fb is buggy, dev hsr_slave_0 [ 981.370088] protocol 88fb is buggy, dev hsr_slave_1 [ 985.284978] net_ratelimit: 16 callbacks suppressed [ 985.290059] protocol 88fb is buggy, dev hsr_slave_0 [ 985.295098] protocol 88fb is buggy, dev hsr_slave_1 [ 985.524938] protocol 88fb is buggy, dev hsr_slave_0 [ 985.530249] protocol 88fb is buggy, dev hsr_slave_1 [ 986.485025] protocol 88fb is buggy, dev hsr_slave_0 [ 986.490141] protocol 88fb is buggy, dev hsr_slave_1 [ 986.644962] protocol 88fb is buggy, dev hsr_slave_0 [ 986.650253] protocol 88fb is buggy, dev hsr_slave_1 [ 986.724999] protocol 88fb is buggy, dev hsr_slave_0 [ 986.730261] protocol 88fb is buggy, dev hsr_slave_1 [ 990.644957] net_ratelimit: 14 callbacks suppressed [ 990.649947] protocol 88fb is buggy, dev hsr_slave_0 [ 990.655051] protocol 88fb is buggy, dev hsr_slave_1 [ 990.804991] protocol 88fb is buggy, dev hsr_slave_0 [ 990.810163] protocol 88fb is buggy, dev hsr_slave_1 [ 990.885007] protocol 88fb is buggy, dev hsr_slave_0 [ 990.890127] protocol 88fb is buggy, dev hsr_slave_1 [ 991.524942] protocol 88fb is buggy, dev hsr_slave_0 [ 991.530036] protocol 88fb is buggy, dev hsr_slave_1 [ 991.764893] protocol 88fb is buggy, dev hsr_slave_0 [ 991.769999] protocol 88fb is buggy, dev hsr_slave_1 [ 995.684919] net_ratelimit: 16 callbacks suppressed [ 995.684925] protocol 88fb is buggy, dev hsr_slave_0 [ 995.695041] protocol 88fb is buggy, dev hsr_slave_1 [ 995.924905] protocol 88fb is buggy, dev hsr_slave_0 [ 995.930026] protocol 88fb is buggy, dev hsr_slave_1 [ 996.884934] protocol 88fb is buggy, dev hsr_slave_0 [ 996.890048] protocol 88fb is buggy, dev hsr_slave_1 [ 997.044980] protocol 88fb is buggy, dev hsr_slave_0 [ 997.050085] protocol 88fb is buggy, dev hsr_slave_1 [ 997.125024] protocol 88fb is buggy, dev hsr_slave_0 [ 997.130110] protocol 88fb is buggy, dev hsr_slave_1 [ 1001.045007] net_ratelimit: 14 callbacks suppressed [ 1001.045014] protocol 88fb is buggy, dev hsr_slave_0 [ 1001.055279] protocol 88fb is buggy, dev hsr_slave_1 [ 1001.204995] protocol 88fb is buggy, dev hsr_slave_0 [ 1001.210140] protocol 88fb is buggy, dev hsr_slave_1 [ 1001.284979] protocol 88fb is buggy, dev hsr_slave_0 [ 1001.290114] protocol 88fb is buggy, dev hsr_slave_1 [ 1001.924924] protocol 88fb is buggy, dev hsr_slave_0 [ 1001.930021] protocol 88fb is buggy, dev hsr_slave_1 [ 1002.164937] protocol 88fb is buggy, dev hsr_slave_0 [ 1002.170292] protocol 88fb is buggy, dev hsr_slave_1 [ 1006.085037] net_ratelimit: 16 callbacks suppressed [ 1006.085047] protocol 88fb is buggy, dev hsr_slave_0 [ 1006.095857] protocol 88fb is buggy, dev hsr_slave_1 [ 1006.324911] protocol 88fb is buggy, dev hsr_slave_0 [ 1006.330196] protocol 88fb is buggy, dev hsr_slave_1 [ 1007.284951] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.290066] protocol 88fb is buggy, dev hsr_slave_1 [ 1007.444985] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.450122] protocol 88fb is buggy, dev hsr_slave_1 [ 1007.525005] protocol 88fb is buggy, dev hsr_slave_0 [ 1007.530191] protocol 88fb is buggy, dev hsr_slave_1 [ 1011.444980] net_ratelimit: 14 callbacks suppressed [ 1011.449983] protocol 88fb is buggy, dev hsr_slave_0 [ 1011.455100] protocol 88fb is buggy, dev hsr_slave_1 [ 1011.604980] protocol 88fb is buggy, dev hsr_slave_0 [ 1011.610338] protocol 88fb is buggy, dev hsr_slave_1 [ 1011.684961] protocol 88fb is buggy, dev hsr_slave_0 [ 1011.690082] protocol 88fb is buggy, dev hsr_slave_1 [ 1012.324965] protocol 88fb is buggy, dev hsr_slave_0 [ 1012.330118] protocol 88fb is buggy, dev hsr_slave_1 [ 1012.564982] protocol 88fb is buggy, dev hsr_slave_0 [ 1012.570522] protocol 88fb is buggy, dev hsr_slave_1 [ 1016.484966] net_ratelimit: 16 callbacks suppressed [ 1016.490239] protocol 88fb is buggy, dev hsr_slave_0 [ 1016.495324] protocol 88fb is buggy, dev hsr_slave_1 [ 1016.724915] protocol 88fb is buggy, dev hsr_slave_0 [ 1016.730242] protocol 88fb is buggy, dev hsr_slave_1 [ 1017.685028] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.690197] protocol 88fb is buggy, dev hsr_slave_1 [ 1017.845003] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.850327] protocol 88fb is buggy, dev hsr_slave_1 [ 1017.924946] protocol 88fb is buggy, dev hsr_slave_0 [ 1017.930265] protocol 88fb is buggy, dev hsr_slave_1 [ 1021.844995] net_ratelimit: 14 callbacks suppressed [ 1021.850118] protocol 88fb is buggy, dev hsr_slave_0 [ 1021.855343] protocol 88fb is buggy, dev hsr_slave_1 [ 1022.005056] protocol 88fb is buggy, dev hsr_slave_0 [ 1022.010188] protocol 88fb is buggy, dev hsr_slave_1 [ 1022.084946] protocol 88fb is buggy, dev hsr_slave_0 [ 1022.090197] protocol 88fb is buggy, dev hsr_slave_1 [ 1022.724937] protocol 88fb is buggy, dev hsr_slave_0 [ 1022.730039] protocol 88fb is buggy, dev hsr_slave_1 [ 1022.964919] protocol 88fb is buggy, dev hsr_slave_0 [ 1022.970111] protocol 88fb is buggy, dev hsr_slave_1 [ 1026.884968] net_ratelimit: 16 callbacks suppressed [ 1026.889979] protocol 88fb is buggy, dev hsr_slave_0 [ 1026.895078] protocol 88fb is buggy, dev hsr_slave_1 [ 1027.124907] protocol 88fb is buggy, dev hsr_slave_0 [ 1027.130015] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.085000] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.090223] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.244986] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.250119] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.324950] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.330092] protocol 88fb is buggy, dev hsr_slave_1 [ 1032.244956] net_ratelimit: 14 callbacks suppressed [ 1032.250077] protocol 88fb is buggy, dev hsr_slave_0 [ 1032.255154] protocol 88fb is buggy, dev hsr_slave_1 [ 1032.405017] protocol 88fb is buggy, dev hsr_slave_0 [ 1032.410211] protocol 88fb is buggy, dev hsr_slave_1 [ 1032.484970] protocol 88fb is buggy, dev hsr_slave_0 [ 1032.490219] protocol 88fb is buggy, dev hsr_slave_1 [ 1033.124919] protocol 88fb is buggy, dev hsr_slave_0 [ 1033.130025] protocol 88fb is buggy, dev hsr_slave_1 [ 1033.364898] protocol 88fb is buggy, dev hsr_slave_0 [ 1033.370022] protocol 88fb is buggy, dev hsr_slave_1 [ 1037.284934] net_ratelimit: 16 callbacks suppressed [ 1037.290102] protocol 88fb is buggy, dev hsr_slave_0 [ 1037.295139] protocol 88fb is buggy, dev hsr_slave_1 [ 1037.524919] protocol 88fb is buggy, dev hsr_slave_0 [ 1037.530074] protocol 88fb is buggy, dev hsr_slave_1 [ 1038.485039] protocol 88fb is buggy, dev hsr_slave_0 [ 1038.490266] protocol 88fb is buggy, dev hsr_slave_1 [ 1038.645034] protocol 88fb is buggy, dev hsr_slave_0 [ 1038.650173] protocol 88fb is buggy, dev hsr_slave_1 [ 1038.725124] protocol 88fb is buggy, dev hsr_slave_0 [ 1038.730356] protocol 88fb is buggy, dev hsr_slave_1 [ 1042.645023] net_ratelimit: 14 callbacks suppressed [ 1042.645051] protocol 88fb is buggy, dev hsr_slave_0 [ 1042.655312] protocol 88fb is buggy, dev hsr_slave_1 [ 1042.804949] protocol 88fb is buggy, dev hsr_slave_0 [ 1042.810152] protocol 88fb is buggy, dev hsr_slave_1 [ 1042.884906] protocol 88fb is buggy, dev hsr_slave_0 [ 1042.889988] protocol 88fb is buggy, dev hsr_slave_1 [ 1043.524966] protocol 88fb is buggy, dev hsr_slave_0 [ 1043.530100] protocol 88fb is buggy, dev hsr_slave_1 [ 1043.764923] protocol 88fb is buggy, dev hsr_slave_0 [ 1043.770063] protocol 88fb is buggy, dev hsr_slave_1 [ 1047.684905] net_ratelimit: 16 callbacks suppressed [ 1047.690046] protocol 88fb is buggy, dev hsr_slave_0 [ 1047.695126] protocol 88fb is buggy, dev hsr_slave_1 [ 1047.924884] protocol 88fb is buggy, dev hsr_slave_0 [ 1047.930139] protocol 88fb is buggy, dev hsr_slave_1 [ 1048.884981] protocol 88fb is buggy, dev hsr_slave_0 [ 1048.890124] protocol 88fb is buggy, dev hsr_slave_1 [ 1049.045009] protocol 88fb is buggy, dev hsr_slave_0 [ 1049.050183] protocol 88fb is buggy, dev hsr_slave_1 [ 1049.124965] protocol 88fb is buggy, dev hsr_slave_0 [ 1049.130164] protocol 88fb is buggy, dev hsr_slave_1 [ 1053.044961] net_ratelimit: 14 callbacks suppressed [ 1053.049933] protocol 88fb is buggy, dev hsr_slave_0 [ 1053.055038] protocol 88fb is buggy, dev hsr_slave_1 [ 1053.205065] protocol 88fb is buggy, dev hsr_slave_0 [ 1053.210358] protocol 88fb is buggy, dev hsr_slave_1 [ 1053.284964] protocol 88fb is buggy, dev hsr_slave_0 [ 1053.290103] protocol 88fb is buggy, dev hsr_slave_1 [ 1053.924978] protocol 88fb is buggy, dev hsr_slave_0 [ 1053.930106] protocol 88fb is buggy, dev hsr_slave_1 [ 1054.164948] protocol 88fb is buggy, dev hsr_slave_0 [ 1054.170106] protocol 88fb is buggy, dev hsr_slave_1 [ 1058.084906] net_ratelimit: 16 callbacks suppressed [ 1058.089894] protocol 88fb is buggy, dev hsr_slave_0 [ 1058.095051] protocol 88fb is buggy, dev hsr_slave_1 [ 1058.324957] protocol 88fb is buggy, dev hsr_slave_0 [ 1058.330096] protocol 88fb is buggy, dev hsr_slave_1 [ 1059.285017] protocol 88fb is buggy, dev hsr_slave_0 [ 1059.290184] protocol 88fb is buggy, dev hsr_slave_1 [ 1059.445063] protocol 88fb is buggy, dev hsr_slave_0 [ 1059.450254] protocol 88fb is buggy, dev hsr_slave_1 [ 1059.525083] protocol 88fb is buggy, dev hsr_slave_0 [ 1059.530250] protocol 88fb is buggy, dev hsr_slave_1 [ 1063.444984] net_ratelimit: 14 callbacks suppressed [ 1063.450077] protocol 88fb is buggy, dev hsr_slave_0 [ 1063.455156] protocol 88fb is buggy, dev hsr_slave_1 [ 1063.605006] protocol 88fb is buggy, dev hsr_slave_0 [ 1063.610215] protocol 88fb is buggy, dev hsr_slave_1 [ 1063.684942] protocol 88fb is buggy, dev hsr_slave_0 [ 1063.690075] protocol 88fb is buggy, dev hsr_slave_1 [ 1064.324991] protocol 88fb is buggy, dev hsr_slave_0 [ 1064.330185] protocol 88fb is buggy, dev hsr_slave_1 [ 1064.564906] protocol 88fb is buggy, dev hsr_slave_0 [ 1064.569993] protocol 88fb is buggy, dev hsr_slave_1 [ 1068.484942] net_ratelimit: 16 callbacks suppressed [ 1068.489948] protocol 88fb is buggy, dev hsr_slave_0 [ 1068.495040] protocol 88fb is buggy, dev hsr_slave_1 [ 1068.724923] protocol 88fb is buggy, dev hsr_slave_0 [ 1068.730048] protocol 88fb is buggy, dev hsr_slave_1 [ 1069.685029] protocol 88fb is buggy, dev hsr_slave_0 [ 1069.690127] protocol 88fb is buggy, dev hsr_slave_1 [ 1069.845069] protocol 88fb is buggy, dev hsr_slave_0 [ 1069.850194] protocol 88fb is buggy, dev hsr_slave_1 [ 1069.925015] protocol 88fb is buggy, dev hsr_slave_0 [ 1069.930241] protocol 88fb is buggy, dev hsr_slave_1 [ 1073.844973] net_ratelimit: 14 callbacks suppressed [ 1073.849967] protocol 88fb is buggy, dev hsr_slave_0 [ 1073.855148] protocol 88fb is buggy, dev hsr_slave_1 [ 1074.004945] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.010082] protocol 88fb is buggy, dev hsr_slave_1 [ 1074.084919] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.090029] protocol 88fb is buggy, dev hsr_slave_1 [ 1074.724916] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.730007] protocol 88fb is buggy, dev hsr_slave_1 [ 1074.964884] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.969986] protocol 88fb is buggy, dev hsr_slave_1 [ 1078.884893] net_ratelimit: 16 callbacks suppressed [ 1078.889856] protocol 88fb is buggy, dev hsr_slave_0 [ 1078.894924] protocol 88fb is buggy, dev hsr_slave_1 [ 1079.124889] protocol 88fb is buggy, dev hsr_slave_0 [ 1079.129976] protocol 88fb is buggy, dev hsr_slave_1 [ 1080.084941] protocol 88fb is buggy, dev hsr_slave_0 [ 1080.090168] protocol 88fb is buggy, dev hsr_slave_1 [ 1080.244962] protocol 88fb is buggy, dev hsr_slave_0 [ 1080.250218] protocol 88fb is buggy, dev hsr_slave_1 [ 1080.324919] protocol 88fb is buggy, dev hsr_slave_0 [ 1080.330028] protocol 88fb is buggy, dev hsr_slave_1 [ 1084.245042] net_ratelimit: 14 callbacks suppressed [ 1084.245052] protocol 88fb is buggy, dev hsr_slave_0 [ 1084.255273] protocol 88fb is buggy, dev hsr_slave_1 [ 1084.404925] protocol 88fb is buggy, dev hsr_slave_0 [ 1084.410028] protocol 88fb is buggy, dev hsr_slave_1 [ 1084.484924] protocol 88fb is buggy, dev hsr_slave_0 [ 1084.490020] protocol 88fb is buggy, dev hsr_slave_1 [ 1085.124956] protocol 88fb is buggy, dev hsr_slave_0 [ 1085.130143] protocol 88fb is buggy, dev hsr_slave_1 [ 1085.364874] protocol 88fb is buggy, dev hsr_slave_0 [ 1085.369961] protocol 88fb is buggy, dev hsr_slave_1 [ 1089.284988] net_ratelimit: 16 callbacks suppressed [ 1089.284994] protocol 88fb is buggy, dev hsr_slave_0 [ 1089.295524] protocol 88fb is buggy, dev hsr_slave_1 [ 1089.524928] protocol 88fb is buggy, dev hsr_slave_0 [ 1089.530008] protocol 88fb is buggy, dev hsr_slave_1 [ 1090.485002] protocol 88fb is buggy, dev hsr_slave_0 [ 1090.490119] protocol 88fb is buggy, dev hsr_slave_1 [ 1090.645043] protocol 88fb is buggy, dev hsr_slave_0 [ 1090.650137] protocol 88fb is buggy, dev hsr_slave_1 [ 1090.724940] protocol 88fb is buggy, dev hsr_slave_0 [ 1090.730031] protocol 88fb is buggy, dev hsr_slave_1 [ 1094.644939] net_ratelimit: 14 callbacks suppressed [ 1094.644946] protocol 88fb is buggy, dev hsr_slave_0 [ 1094.655240] protocol 88fb is buggy, dev hsr_slave_1 [ 1094.805090] protocol 88fb is buggy, dev hsr_slave_0 [ 1094.810180] protocol 88fb is buggy, dev hsr_slave_1 [ 1094.884900] protocol 88fb is buggy, dev hsr_slave_0 [ 1094.890016] protocol 88fb is buggy, dev hsr_slave_1 [ 1095.524908] protocol 88fb is buggy, dev hsr_slave_0 [ 1095.530212] protocol 88fb is buggy, dev hsr_slave_1 [ 1095.764998] protocol 88fb is buggy, dev hsr_slave_0 [ 1095.770092] protocol 88fb is buggy, dev hsr_slave_1 [ 1099.695002] net_ratelimit: 16 callbacks suppressed [ 1099.695010] protocol 88fb is buggy, dev hsr_slave_0 [ 1099.705123] protocol 88fb is buggy, dev hsr_slave_1 [ 1099.925020] protocol 88fb is buggy, dev hsr_slave_0 [ 1099.930432] protocol 88fb is buggy, dev hsr_slave_1 [ 1100.885023] protocol 88fb is buggy, dev hsr_slave_0 [ 1100.890185] protocol 88fb is buggy, dev hsr_slave_1 [ 1101.045107] protocol 88fb is buggy, dev hsr_slave_0 [ 1101.050623] protocol 88fb is buggy, dev hsr_slave_1 [ 1101.124979] protocol 88fb is buggy, dev hsr_slave_0 [ 1101.130172] protocol 88fb is buggy, dev hsr_slave_1 [ 1104.005089] INFO: task syz-executor1:8074 blocked for more than 140 seconds. [ 1104.012661] Not tainted 5.0.0-rc2+ #29 [ 1104.017204] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1104.025281] syz-executor1 D20440 8074 1 0x00000004 [ 1104.030936] Call Trace: [ 1104.033555] __schedule+0x897/0x1e60 [ 1104.037358] ? __schedule+0x89f/0x1e60 [ 1104.041246] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1104.046393] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1104.051437] ? mark_held_locks+0xb1/0x100 [ 1104.055679] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1104.060539] ? mark_held_locks+0xb1/0x100 [ 1104.064677] ? _raw_spin_unlock_irq+0x28/0x90 [ 1104.069216] schedule+0xfe/0x350 [ 1104.072564] ? preempt_schedule_common+0x4f/0xe0 [ 1104.077356] ? __schedule+0x1e60/0x1e60 [ 1104.081342] ? preempt_schedule+0x4b/0x60 [ 1104.085577] ? ___preempt_schedule+0x16/0x18 [ 1104.089994] rwsem_down_read_failed+0x360/0x6d0 [ 1104.094655] ? rt_mutex_futex_unlock+0x120/0x120 [ 1104.099490] ? lock_downgrade+0x910/0x910 [ 1104.103629] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1104.109026] ? rcuwait_wake_up+0x1c8/0x300 [ 1104.113284] ? check_preemption_disabled+0x48/0x290 [ 1104.118373] call_rwsem_down_read_failed+0x18/0x30 [ 1104.123302] __percpu_down_read+0x142/0x1d0 [ 1104.127671] ? percpu_free_rwsem+0xa0/0xa0 [ 1104.131902] ? rcu_read_lock_sched_held+0x110/0x130 [ 1104.137082] uprobe_start_dup_mmap+0xbf/0xe0 [ 1104.141597] copy_process+0x3041/0x8710 [ 1104.145696] ? page_swapcount+0x1c0/0x1c0 [ 1104.149842] ? _raw_spin_unlock_irq+0x28/0x90 [ 1104.154358] ? __cleanup_sighand+0x70/0x70 [ 1104.158659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.164185] ? reuse_swap_page+0x453/0x14a0 [ 1104.168539] ? swp_swapcount+0x540/0x540 [ 1104.172613] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1104.178212] ? __lock_acquire+0x572/0x4a30 [ 1104.182458] ? do_raw_spin_trylock+0x270/0x270 [ 1104.187097] ? mark_held_locks+0x100/0x100 [ 1104.191323] ? finish_mkwrite_fault+0x540/0x540 [ 1104.196044] ? kasan_check_read+0x11/0x20 [ 1104.200186] ? do_raw_spin_lock+0x156/0x360 [ 1104.204499] ? rwlock_bug.part.0+0x90/0x90 [ 1104.208882] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 1104.214001] ? add_lock_to_list.isra.0+0x450/0x450 [ 1104.218986] ? add_lock_to_list.isra.0+0x450/0x450 [ 1104.223913] ? __handle_mm_fault+0x955/0x55a0 [ 1104.228492] ? __might_fault+0x12b/0x1e0 [ 1104.232631] ? find_held_lock+0x35/0x120 [ 1104.236784] ? __might_fault+0x12b/0x1e0 [ 1104.240839] ? lock_acquire+0x1db/0x570 [ 1104.244954] ? lock_downgrade+0x910/0x910 [ 1104.249093] ? lock_release+0xc40/0xc40 [ 1104.253055] ? trace_hardirqs_off_caller+0x300/0x300 [ 1104.258208] _do_fork+0x1a9/0x1170 [ 1104.261751] ? fork_idle+0x1d0/0x1d0 [ 1104.265530] ? kasan_check_read+0x11/0x20 [ 1104.269673] ? _copy_to_user+0xc9/0x120 [ 1104.273642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1104.279262] ? put_timespec64+0x115/0x1b0 [ 1104.283423] ? nsecs_to_jiffies+0x30/0x30 [ 1104.287631] ? vmacache_update+0x114/0x140 [ 1104.291876] ? do_syscall_64+0x8c/0x800 [ 1104.295913] ? do_syscall_64+0x8c/0x800 [ 1104.299900] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1104.304482] ? trace_hardirqs_on+0xbd/0x310 [ 1104.308852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.314394] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1104.319804] ? trace_hardirqs_off_caller+0x300/0x300 [ 1104.324960] __x64_sys_clone+0xbf/0x150 [ 1104.328941] do_syscall_64+0x1a3/0x800 [ 1104.332826] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1104.337810] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1104.342825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1104.347722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1104.352915] RIP: 0033:0x45649a [ 1104.356188] Code: Bad RIP value. [ 1104.359552] RSP: 002b:00007ffe59305360 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1104.367314] RAX: ffffffffffffffda RBX: 00007ffe59305360 RCX: 000000000045649a [ 1104.374588] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1104.381927] RBP: 00007ffe593053a0 R08: 0000000000000001 R09: 0000000002a0e940 [ 1104.389337] R10: 0000000002a0ec10 R11: 0000000000000246 R12: 0000000000000001 [ 1104.396895] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 [ 1104.404195] INFO: task syz-executor2:8076 blocked for more than 140 seconds. [ 1104.411442] Not tainted 5.0.0-rc2+ #29 [ 1104.415886] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1104.423844] syz-executor2 D20440 8076 1 0x00000004 [ 1104.429682] Call Trace: [ 1104.432470] __schedule+0x897/0x1e60 [ 1104.436248] ? __schedule+0x89f/0x1e60 [ 1104.440143] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1104.445197] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1104.450208] ? mark_held_locks+0xb1/0x100 [ 1104.454347] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1104.459243] ? mark_held_locks+0xb1/0x100 [ 1104.463546] ? _raw_spin_unlock_irq+0x28/0x90 [ 1104.468157] schedule+0xfe/0x350 [ 1104.471525] ? preempt_schedule_common+0x4f/0xe0 [ 1104.476336] ? __schedule+0x1e60/0x1e60 [ 1104.480398] ? preempt_schedule+0x4b/0x60 [ 1104.484555] ? ___preempt_schedule+0x16/0x18 [ 1104.489036] rwsem_down_read_failed+0x360/0x6d0 [ 1104.493707] ? rt_mutex_futex_unlock+0x120/0x120 [ 1104.498499] ? lock_downgrade+0x910/0x910 [ 1104.502703] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1104.508071] ? rcuwait_wake_up+0x1c8/0x300 [ 1104.512344] ? check_preemption_disabled+0x48/0x290 [ 1104.517447] call_rwsem_down_read_failed+0x18/0x30 [ 1104.522380] __percpu_down_read+0x142/0x1d0 [ 1104.526787] ? percpu_free_rwsem+0xa0/0xa0 [ 1104.531014] ? rcu_read_lock_sched_held+0x110/0x130 [ 1104.536071] uprobe_start_dup_mmap+0xbf/0xe0 [ 1104.540471] copy_process+0x3041/0x8710 [ 1104.544439] ? page_swapcount+0x1c0/0x1c0 [ 1104.548621] ? _raw_spin_unlock_irq+0x28/0x90 [ 1104.553114] ? __cleanup_sighand+0x70/0x70 [ 1104.557378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.562903] ? reuse_swap_page+0x453/0x14a0 [ 1104.567372] ? swp_swapcount+0x540/0x540 [ 1104.571431] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1104.577004] ? __lock_acquire+0x572/0x4a30 [ 1104.581233] ? do_raw_spin_trylock+0x270/0x270 [ 1104.585843] ? mark_held_locks+0x100/0x100 [ 1104.590073] ? finish_mkwrite_fault+0x540/0x540 [ 1104.594726] ? kasan_check_read+0x11/0x20 [ 1104.598991] ? do_raw_spin_lock+0x156/0x360 [ 1104.603319] ? rwlock_bug.part.0+0x90/0x90 [ 1104.607633] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 1104.612886] ? add_lock_to_list.isra.0+0x450/0x450 [ 1104.617933] ? add_lock_to_list.isra.0+0x450/0x450 [ 1104.622967] ? __handle_mm_fault+0x955/0x55a0 [ 1104.627540] ? __might_fault+0x12b/0x1e0 [ 1104.631599] ? find_held_lock+0x35/0x120 [ 1104.635725] ? __might_fault+0x12b/0x1e0 [ 1104.639775] ? lock_acquire+0x1db/0x570 [ 1104.643739] ? lock_downgrade+0x910/0x910 [ 1104.647957] ? lock_release+0xc40/0xc40 [ 1104.651936] ? trace_hardirqs_off_caller+0x300/0x300 [ 1104.657123] _do_fork+0x1a9/0x1170 [ 1104.660657] ? fork_idle+0x1d0/0x1d0 [ 1104.664363] ? kasan_check_read+0x11/0x20 [ 1104.668556] ? _copy_to_user+0xc9/0x120 [ 1104.672527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1104.678112] ? put_timespec64+0x115/0x1b0 [ 1104.682262] ? nsecs_to_jiffies+0x30/0x30 [ 1104.686533] ? do_syscall_64+0x8c/0x800 [ 1104.690510] ? do_syscall_64+0x8c/0x800 [ 1104.694618] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1104.699560] ? trace_hardirqs_on+0xbd/0x310 [ 1104.704113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.711464] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1104.717082] ? trace_hardirqs_off_caller+0x300/0x300 [ 1104.722195] __x64_sys_clone+0xbf/0x150 [ 1104.726452] do_syscall_64+0x1a3/0x800 [ 1104.730469] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1104.736559] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1104.741982] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1104.747687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1104.752876] RIP: 0033:0x45649a [ 1104.756140] Code: Bad RIP value. [ 1104.759686] RSP: 002b:00007fff885c2c20 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1104.768115] RAX: ffffffffffffffda RBX: 00007fff885c2c20 RCX: 000000000045649a [ 1104.776102] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1104.784180] RBP: 00007fff885c2c60 R08: 0000000000000001 R09: 00000000015f6940 [ 1104.792066] R10: 00000000015f6c10 R11: 0000000000000246 R12: 0000000000000001 [ 1104.799434] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 1104.807013] INFO: task syz-executor3:8079 blocked for more than 140 seconds. [ 1104.814184] Not tainted 5.0.0-rc2+ #29 [ 1104.818620] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1104.826609] syz-executor3 D20440 8079 1 0x00000004 [ 1104.832281] Call Trace: [ 1104.834915] __schedule+0x897/0x1e60 [ 1104.838618] ? __schedule+0x89f/0x1e60 [ 1104.842491] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1104.847533] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1104.852546] ? mark_held_locks+0xb1/0x100 [ 1104.856749] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1104.861632] ? mark_held_locks+0xb1/0x100 [ 1104.865825] ? _raw_spin_unlock_irq+0x28/0x90 [ 1104.870316] schedule+0xfe/0x350 [ 1104.873676] ? preempt_schedule_common+0x4f/0xe0 [ 1104.878469] ? __schedule+0x1e60/0x1e60 [ 1104.882422] ? preempt_schedule+0x4b/0x60 [ 1104.886740] ? ___preempt_schedule+0x16/0x18 [ 1104.891152] rwsem_down_read_failed+0x360/0x6d0 [ 1104.895868] ? rt_mutex_futex_unlock+0x120/0x120 [ 1104.900654] ? lock_downgrade+0x910/0x910 [ 1104.904788] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1104.910123] ? rcuwait_wake_up+0x1c8/0x300 [ 1104.914465] ? check_preemption_disabled+0x48/0x290 [ 1104.919643] call_rwsem_down_read_failed+0x18/0x30 [ 1104.924773] __percpu_down_read+0x142/0x1d0 [ 1104.929182] ? percpu_free_rwsem+0xa0/0xa0 [ 1104.933537] ? rcu_read_lock_sched_held+0x110/0x130 [ 1104.938902] uprobe_start_dup_mmap+0xbf/0xe0 [ 1104.943330] copy_process+0x3041/0x8710 [ 1104.947391] ? page_swapcount+0x1c0/0x1c0 [ 1104.951762] ? _raw_spin_unlock_irq+0x28/0x90 [ 1104.956415] ? __cleanup_sighand+0x70/0x70 [ 1104.960770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1104.966410] ? reuse_swap_page+0x453/0x14a0 [ 1104.970989] ? swp_swapcount+0x540/0x540 [ 1104.975170] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1104.980709] ? __lock_acquire+0x572/0x4a30 [ 1104.984983] ? do_raw_spin_trylock+0x270/0x270 [ 1104.989558] ? mark_held_locks+0x100/0x100 [ 1104.993788] ? finish_mkwrite_fault+0x540/0x540 [ 1104.998501] ? kasan_check_read+0x11/0x20 [ 1105.002652] ? do_raw_spin_lock+0x156/0x360 [ 1105.007077] ? rwlock_bug.part.0+0x90/0x90 [ 1105.011432] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 1105.016649] ? add_lock_to_list.isra.0+0x450/0x450 [ 1105.021572] ? add_lock_to_list.isra.0+0x450/0x450 [ 1105.026730] ? __handle_mm_fault+0x955/0x55a0 [ 1105.031466] ? __might_fault+0x12b/0x1e0 [ 1105.035633] ? find_held_lock+0x35/0x120 [ 1105.039706] ? __might_fault+0x12b/0x1e0 [ 1105.043891] ? lock_acquire+0x1db/0x570 [ 1105.048267] net_ratelimit: 14 callbacks suppressed [ 1105.048273] protocol 88fb is buggy, dev hsr_slave_0 [ 1105.048322] protocol 88fb is buggy, dev hsr_slave_1 [ 1105.063546] ? lock_downgrade+0x910/0x910 [ 1105.067810] ? lock_release+0xc40/0xc40 [ 1105.071880] ? trace_hardirqs_off_caller+0x300/0x300 [ 1105.077112] _do_fork+0x1a9/0x1170 [ 1105.080790] ? fork_idle+0x1d0/0x1d0 [ 1105.084624] ? kasan_check_read+0x11/0x20 [ 1105.088875] ? _copy_to_user+0xc9/0x120 [ 1105.093209] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1105.098971] ? put_timespec64+0x115/0x1b0 [ 1105.103130] ? nsecs_to_jiffies+0x30/0x30 [ 1105.107336] ? do_syscall_64+0x8c/0x800 [ 1105.111527] ? do_syscall_64+0x8c/0x800 [ 1105.115618] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1105.120307] ? trace_hardirqs_on+0xbd/0x310 [ 1105.124639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.130299] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.135711] ? trace_hardirqs_off_caller+0x300/0x300 [ 1105.140828] __x64_sys_clone+0xbf/0x150 [ 1105.144868] do_syscall_64+0x1a3/0x800 [ 1105.148741] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1105.153947] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1105.158999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1105.163846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.169070] RIP: 0033:0x45649a [ 1105.172265] Code: Bad RIP value. [ 1105.175772] RSP: 002b:00007fff878a0980 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1105.183813] RAX: ffffffffffffffda RBX: 00007fff878a0980 RCX: 000000000045649a [ 1105.191499] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1105.199775] RBP: 00007fff878a09c0 R08: 0000000000000001 R09: 000000000180f940 [ 1105.207949] protocol 88fb is buggy, dev hsr_slave_0 [ 1105.208000] protocol 88fb is buggy, dev hsr_slave_1 [ 1105.220153] R10: 000000000180fc10 R11: 0000000000000246 R12: 0000000000000001 [ 1105.227870] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000003 [ 1105.235332] INFO: task syz-executor5:8087 blocked for more than 140 seconds. [ 1105.242535] Not tainted 5.0.0-rc2+ #29 [ 1105.247700] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1105.256073] syz-executor5 D20440 8087 1 0x00000004 [ 1105.262085] Call Trace: [ 1105.264674] __schedule+0x897/0x1e60 [ 1105.268623] ? __schedule+0x89f/0x1e60 [ 1105.272576] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1105.277735] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1105.282766] ? mark_held_locks+0xb1/0x100 [ 1105.286995] protocol 88fb is buggy, dev hsr_slave_0 [ 1105.287034] protocol 88fb is buggy, dev hsr_slave_1 [ 1105.297111] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1105.301940] ? mark_held_locks+0xb1/0x100 [ 1105.306273] ? _raw_spin_unlock_irq+0x28/0x90 [ 1105.310754] schedule+0xfe/0x350 [ 1105.314100] ? preempt_schedule_common+0x4f/0xe0 [ 1105.318879] ? __schedule+0x1e60/0x1e60 [ 1105.322836] ? preempt_schedule+0x4b/0x60 [ 1105.327033] ? ___preempt_schedule+0x16/0x18 [ 1105.331447] rwsem_down_read_failed+0x360/0x6d0 [ 1105.336158] ? rt_mutex_futex_unlock+0x120/0x120 [ 1105.340898] ? lock_downgrade+0x910/0x910 [ 1105.345354] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1105.350798] ? rcuwait_wake_up+0x1c8/0x300 [ 1105.355075] ? check_preemption_disabled+0x48/0x290 [ 1105.360086] call_rwsem_down_read_failed+0x18/0x30 [ 1105.365061] __percpu_down_read+0x142/0x1d0 [ 1105.369552] ? percpu_free_rwsem+0xa0/0xa0 [ 1105.373854] ? rcu_read_lock_sched_held+0x110/0x130 [ 1105.378991] uprobe_start_dup_mmap+0xbf/0xe0 [ 1105.383388] copy_process+0x3041/0x8710 [ 1105.387423] ? page_swapcount+0x1c0/0x1c0 [ 1105.391636] ? __cleanup_sighand+0x70/0x70 [ 1105.395928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.401459] ? reuse_swap_page+0x453/0x14a0 [ 1105.405820] ? swp_swapcount+0x540/0x540 [ 1105.409893] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1105.415567] ? __lock_acquire+0x572/0x4a30 [ 1105.419806] ? do_raw_spin_trylock+0x270/0x270 [ 1105.424485] ? mark_held_locks+0x100/0x100 [ 1105.428784] ? finish_mkwrite_fault+0x540/0x540 [ 1105.433460] ? kasan_check_read+0x11/0x20 [ 1105.437754] ? do_raw_spin_lock+0x156/0x360 [ 1105.442071] ? rwlock_bug.part.0+0x90/0x90 [ 1105.446359] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 1105.451571] ? add_lock_to_list.isra.0+0x450/0x450 [ 1105.456621] ? add_lock_to_list.isra.0+0x450/0x450 [ 1105.461553] ? __handle_mm_fault+0x955/0x55a0 [ 1105.466091] ? __might_fault+0x12b/0x1e0 [ 1105.470151] ? find_held_lock+0x35/0x120 [ 1105.474344] ? __might_fault+0x12b/0x1e0 [ 1105.478486] ? lock_acquire+0x1db/0x570 [ 1105.482467] ? lock_downgrade+0x910/0x910 [ 1105.486816] ? lock_release+0xc40/0xc40 [ 1105.490788] ? trace_hardirqs_off_caller+0x300/0x300 [ 1105.496110] _do_fork+0x1a9/0x1170 [ 1105.499644] ? fork_idle+0x1d0/0x1d0 [ 1105.503366] ? kasan_check_read+0x11/0x20 [ 1105.507835] ? _copy_to_user+0xc9/0x120 [ 1105.511806] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1105.517378] ? put_timespec64+0x115/0x1b0 [ 1105.521525] ? nsecs_to_jiffies+0x30/0x30 [ 1105.526730] ? vmacache_update+0x114/0x140 [ 1105.530972] ? do_syscall_64+0x8c/0x800 [ 1105.534985] ? do_syscall_64+0x8c/0x800 [ 1105.538960] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1105.543529] ? trace_hardirqs_on+0xbd/0x310 [ 1105.547898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.553427] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.558844] ? trace_hardirqs_off_caller+0x300/0x300 [ 1105.564056] __x64_sys_clone+0xbf/0x150 [ 1105.568102] do_syscall_64+0x1a3/0x800 [ 1105.571976] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1105.576956] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1105.582101] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1105.587026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.592203] RIP: 0033:0x45649a [ 1105.595454] Code: Bad RIP value. [ 1105.598803] RSP: 002b:00007ffc343f5080 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1105.606573] RAX: ffffffffffffffda RBX: 00007ffc343f5080 RCX: 000000000045649a [ 1105.613836] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1105.621281] RBP: 00007ffc343f50c0 R08: 0000000000000001 R09: 0000000000e79940 [ 1105.628574] R10: 0000000000e79c10 R11: 0000000000000246 R12: 0000000000000001 [ 1105.636039] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 1105.643618] INFO: task udevd:9351 blocked for more than 140 seconds. [ 1105.650156] Not tainted 5.0.0-rc2+ #29 [ 1105.654551] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1105.662679] udevd D23896 9351 3865 0x00000000 [ 1105.668325] Call Trace: [ 1105.670908] __schedule+0x897/0x1e60 [ 1105.674750] ? __schedule+0x89f/0x1e60 [ 1105.678680] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1105.683807] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1105.688875] ? mark_held_locks+0xb1/0x100 [ 1105.693010] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1105.697912] ? mark_held_locks+0xb1/0x100 [ 1105.702041] ? _raw_spin_unlock_irq+0x28/0x90 [ 1105.706580] schedule+0xfe/0x350 [ 1105.709931] ? preempt_schedule_common+0x4f/0xe0 [ 1105.714673] ? __schedule+0x1e60/0x1e60 [ 1105.718676] ? preempt_schedule+0x4b/0x60 [ 1105.722826] ? ___preempt_schedule+0x16/0x18 [ 1105.727285] rwsem_down_read_failed+0x360/0x6d0 [ 1105.731948] ? rt_mutex_futex_unlock+0x120/0x120 [ 1105.736734] ? lock_downgrade+0x910/0x910 [ 1105.740871] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1105.746179] ? rcuwait_wake_up+0x1c8/0x300 [ 1105.750404] ? check_preemption_disabled+0x48/0x290 [ 1105.755466] call_rwsem_down_read_failed+0x18/0x30 [ 1105.760384] __percpu_down_read+0x142/0x1d0 [ 1105.764698] ? percpu_free_rwsem+0xa0/0xa0 [ 1105.769103] ? rcu_read_lock_sched_held+0x110/0x130 [ 1105.774274] uprobe_start_dup_mmap+0xbf/0xe0 [ 1105.778727] copy_process+0x3041/0x8710 [ 1105.782692] ? is_bpf_text_address+0xac/0x170 [ 1105.787240] ? find_held_lock+0x35/0x120 [ 1105.791438] ? is_bpf_text_address+0xac/0x170 [ 1105.796098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.801662] ? __cleanup_sighand+0x70/0x70 [ 1105.805934] ? print_usage_bug+0xd0/0xd0 [ 1105.810200] ? unwind_get_return_address+0x61/0xa0 [ 1105.815190] ? create_pipe_files+0x478/0x730 [ 1105.819582] ? __do_pipe_flags+0x48/0x250 [ 1105.823768] ? print_usage_bug+0xd0/0xd0 [ 1105.827904] ? __lock_acquire+0x572/0x4a30 [ 1105.832125] ? __do_pipe_flags+0x48/0x250 [ 1105.836314] ? mark_held_locks+0x100/0x100 [ 1105.840551] ? __lock_acquire+0x572/0x4a30 [ 1105.844767] ? add_lock_to_list.isra.0+0x450/0x450 [ 1105.849747] ? selinux_file_alloc_security+0xb4/0x190 [ 1105.854969] ? mark_held_locks+0x100/0x100 [ 1105.859211] ? __alloc_fd+0x549/0x700 [ 1105.863191] ? add_lock_to_list.isra.0+0x450/0x450 [ 1105.868167] ? __fd_install+0x2a0/0x8c0 [ 1105.872142] ? find_held_lock+0x35/0x120 [ 1105.876385] ? __fd_install+0x2a0/0x8c0 [ 1105.880361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.886074] ? lock_downgrade+0x910/0x910 [ 1105.890210] ? kasan_check_read+0x11/0x20 [ 1105.894352] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1105.899662] ? rcu_softirq_qs+0x20/0x20 [ 1105.903813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1105.909397] _do_fork+0x1a9/0x1170 [ 1105.912960] ? fork_idle+0x1d0/0x1d0 [ 1105.916723] ? fd_install+0x4d/0x60 [ 1105.920339] ? do_syscall_64+0x8c/0x800 [ 1105.924537] ? do_syscall_64+0x8c/0x800 [ 1105.928630] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1105.933198] ? trace_hardirqs_on+0xbd/0x310 [ 1105.934874] protocol 88fb is buggy, dev hsr_slave_0 [ 1105.937543] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.942562] protocol 88fb is buggy, dev hsr_slave_1 [ 1105.948043] ? trace_hardirqs_off_caller+0x300/0x300 [ 1105.958194] __x64_sys_clone+0xbf/0x150 [ 1105.962156] do_syscall_64+0x1a3/0x800 [ 1105.966109] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1105.971029] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1105.976136] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1105.981009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.986245] RIP: 0033:0x7f8c7d2f4f46 [ 1105.989967] Code: Bad RIP value. [ 1105.993315] RSP: 002b:00007ffd6f52dde0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1106.001075] RAX: ffffffffffffffda RBX: 00007ffd6f52dde0 RCX: 00007f8c7d2f4f46 [ 1106.008401] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1106.015737] RBP: 00007ffd6f52de40 R08: 0000000000002487 R09: 0000000000002487 [ 1106.023003] R10: 00007f8c7dc11a70 R11: 0000000000000246 R12: 0000000000000000 [ 1106.030307] R13: 00007ffd6f52de00 R14: 0000000000000005 R15: 0000000000000005 [ 1106.037641] INFO: task udevd:9352 blocked for more than 140 seconds. [ 1106.044115] Not tainted 5.0.0-rc2+ #29 [ 1106.048546] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1106.056556] udevd D23816 9352 3865 0x00000000 [ 1106.062193] Call Trace: [ 1106.064796] __schedule+0x897/0x1e60 [ 1106.068573] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1106.073589] ? mark_held_locks+0xb1/0x100 [ 1106.077775] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1106.082623] ? mark_held_locks+0xb1/0x100 [ 1106.086827] ? _raw_spin_unlock_irq+0x28/0x90 [ 1106.091329] schedule+0xfe/0x350 [ 1106.094692] ? kasan_check_read+0x11/0x20 [ 1106.098998] ? __schedule+0x1e60/0x1e60 [ 1106.102977] ? trace_hardirqs_off_caller+0x300/0x300 [ 1106.108193] ? do_raw_spin_trylock+0x270/0x270 [ 1106.112798] ? try_to_wake_up+0xf9/0x1480 [ 1106.117075] ? mark_held_locks+0x100/0x100 [ 1106.121323] rwsem_down_read_failed+0x360/0x6d0 [ 1106.126111] ? rt_mutex_futex_unlock+0x120/0x120 [ 1106.130865] ? lock_downgrade+0x910/0x910 [ 1106.135126] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1106.140479] ? rcuwait_wake_up+0x1c8/0x300 [ 1106.144715] ? check_preemption_disabled+0x48/0x290 [ 1106.149785] call_rwsem_down_read_failed+0x18/0x30 [ 1106.154874] __percpu_down_read+0x142/0x1d0 [ 1106.159203] ? percpu_free_rwsem+0xa0/0xa0 [ 1106.163435] ? rcu_read_lock_sched_held+0x110/0x130 [ 1106.168488] uprobe_start_dup_mmap+0xbf/0xe0 [ 1106.172908] copy_process+0x3041/0x8710 [ 1106.174894] protocol 88fb is buggy, dev hsr_slave_0 [ 1106.176948] ? is_bpf_text_address+0xac/0x170 [ 1106.181974] protocol 88fb is buggy, dev hsr_slave_1 [ 1106.186420] ? find_held_lock+0x35/0x120 [ 1106.195490] ? is_bpf_text_address+0xac/0x170 [ 1106.199997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.205602] ? __cleanup_sighand+0x70/0x70 [ 1106.209840] ? print_usage_bug+0xd0/0xd0 [ 1106.213911] ? unwind_get_return_address+0x61/0xa0 [ 1106.218934] ? create_pipe_files+0x478/0x730 [ 1106.223353] ? __do_pipe_flags+0x48/0x250 [ 1106.227559] ? print_usage_bug+0xd0/0xd0 [ 1106.231614] ? __lock_acquire+0x572/0x4a30 [ 1106.235895] ? __do_pipe_flags+0x48/0x250 [ 1106.240043] ? mark_held_locks+0x100/0x100 [ 1106.244265] ? __lock_acquire+0x572/0x4a30 [ 1106.248532] ? add_lock_to_list.isra.0+0x450/0x450 [ 1106.253464] ? selinux_file_alloc_security+0xb4/0x190 [ 1106.258706] ? mark_held_locks+0x100/0x100 [ 1106.262942] ? __alloc_fd+0x549/0x700 [ 1106.266787] ? add_lock_to_list.isra.0+0x450/0x450 [ 1106.271729] ? __fd_install+0x2a0/0x8c0 [ 1106.275756] ? find_held_lock+0x35/0x120 [ 1106.279817] ? __fd_install+0x2a0/0x8c0 [ 1106.283777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.289379] ? lock_downgrade+0x910/0x910 [ 1106.293522] ? kasan_check_read+0x11/0x20 [ 1106.297717] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1106.303008] ? rcu_softirq_qs+0x20/0x20 [ 1106.307079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.312622] _do_fork+0x1a9/0x1170 [ 1106.316227] ? fork_idle+0x1d0/0x1d0 [ 1106.319952] ? fd_install+0x4d/0x60 [ 1106.323567] ? do_syscall_64+0x8c/0x800 [ 1106.327594] ? do_syscall_64+0x8c/0x800 [ 1106.331571] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1106.336213] ? trace_hardirqs_on+0xbd/0x310 [ 1106.340532] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.345960] ? trace_hardirqs_off_caller+0x300/0x300 [ 1106.351067] __x64_sys_clone+0xbf/0x150 [ 1106.355111] do_syscall_64+0x1a3/0x800 [ 1106.358997] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1106.363912] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1106.368977] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1106.373837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.379072] RIP: 0033:0x7f8c7d2f4f46 [ 1106.382794] Code: Bad RIP value. [ 1106.386210] RSP: 002b:00007ffd6f52dde0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1106.393915] RAX: ffffffffffffffda RBX: 00007ffd6f52dde0 RCX: 00007f8c7d2f4f46 [ 1106.401215] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1106.408505] RBP: 00007ffd6f52de40 R08: 0000000000002488 R09: 0000000000002488 [ 1106.415820] R10: 00007f8c7dc11a70 R11: 0000000000000246 R12: 0000000000000000 [ 1106.423085] R13: 00007ffd6f52de00 R14: 0000000000000005 R15: 0000000000000005 [ 1106.430429] INFO: task udevd:11507 blocked for more than 140 seconds. [ 1106.437023] Not tainted 5.0.0-rc2+ #29 [ 1106.441418] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1106.449434] udevd D23784 11507 3865 0x00000000 [ 1106.455088] Call Trace: [ 1106.457666] __schedule+0x897/0x1e60 [ 1106.461371] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1106.466465] ? mark_held_locks+0xb1/0x100 [ 1106.470615] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1106.475524] ? mark_held_locks+0xb1/0x100 [ 1106.479675] ? _raw_spin_unlock_irq+0x28/0x90 [ 1106.484158] schedule+0xfe/0x350 [ 1106.487557] ? kasan_check_read+0x11/0x20 [ 1106.491711] ? __schedule+0x1e60/0x1e60 [ 1106.495748] ? trace_hardirqs_off_caller+0x300/0x300 [ 1106.500846] ? do_raw_spin_trylock+0x270/0x270 [ 1106.505481] ? try_to_wake_up+0xf9/0x1480 [ 1106.509627] ? mark_held_locks+0x100/0x100 [ 1106.513856] rwsem_down_read_failed+0x360/0x6d0 [ 1106.518571] ? rt_mutex_futex_unlock+0x120/0x120 [ 1106.523326] ? lock_downgrade+0x910/0x910 [ 1106.527592] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1106.532874] ? rcuwait_wake_up+0x1c8/0x300 [ 1106.537232] ? check_preemption_disabled+0x48/0x290 [ 1106.542251] call_rwsem_down_read_failed+0x18/0x30 [ 1106.547227] __percpu_down_read+0x142/0x1d0 [ 1106.551547] ? percpu_free_rwsem+0xa0/0xa0 [ 1106.555842] ? rcu_read_lock_sched_held+0x110/0x130 [ 1106.560863] uprobe_start_dup_mmap+0xbf/0xe0 [ 1106.565540] copy_process+0x3041/0x8710 [ 1106.569530] ? is_bpf_text_address+0xac/0x170 [ 1106.574022] ? find_held_lock+0x35/0x120 [ 1106.578120] ? is_bpf_text_address+0xac/0x170 [ 1106.582616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.588221] ? __cleanup_sighand+0x70/0x70 [ 1106.592456] ? print_usage_bug+0xd0/0xd0 [ 1106.596585] ? unwind_get_return_address+0x61/0xa0 [ 1106.601526] ? create_pipe_files+0x478/0x730 [ 1106.605996] ? __do_pipe_flags+0x48/0x250 [ 1106.610140] ? print_usage_bug+0xd0/0xd0 [ 1106.614186] ? __lock_acquire+0x572/0x4a30 [ 1106.618457] ? __do_pipe_flags+0x48/0x250 [ 1106.622606] ? mark_held_locks+0x100/0x100 [ 1106.626875] ? __lock_acquire+0x572/0x4a30 [ 1106.631108] ? add_lock_to_list.isra.0+0x450/0x450 [ 1106.636097] ? selinux_file_alloc_security+0xb4/0x190 [ 1106.641296] ? mark_held_locks+0x100/0x100 [ 1106.645592] ? __alloc_fd+0x549/0x700 [ 1106.649387] ? add_lock_to_list.isra.0+0x450/0x450 [ 1106.654312] ? __fd_install+0x2a0/0x8c0 [ 1106.658332] ? find_held_lock+0x35/0x120 [ 1106.662394] ? __fd_install+0x2a0/0x8c0 [ 1106.666419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.672155] ? lock_downgrade+0x910/0x910 [ 1106.676356] ? kasan_check_read+0x11/0x20 [ 1106.680505] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1106.685837] ? rcu_softirq_qs+0x20/0x20 [ 1106.689812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.695407] _do_fork+0x1a9/0x1170 [ 1106.698958] ? fork_idle+0x1d0/0x1d0 [ 1106.702674] ? fd_install+0x4d/0x60 [ 1106.706343] ? do_syscall_64+0x8c/0x800 [ 1106.710316] ? do_syscall_64+0x8c/0x800 [ 1106.714284] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1106.718901] ? trace_hardirqs_on+0xbd/0x310 [ 1106.723237] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.728674] ? trace_hardirqs_off_caller+0x300/0x300 [ 1106.733779] __x64_sys_clone+0xbf/0x150 [ 1106.737808] do_syscall_64+0x1a3/0x800 [ 1106.741694] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1106.746681] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1106.751695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1106.756603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1106.761788] RIP: 0033:0x7f8c7d2f4f46 [ 1106.765558] Code: Bad RIP value. [ 1106.768913] RSP: 002b:00007ffd6f52dde0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1106.776669] RAX: ffffffffffffffda RBX: 00007ffd6f52dde0 RCX: 00007f8c7d2f4f46 [ 1106.783944] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1106.791281] RBP: 00007ffd6f52de40 R08: 0000000000002cf3 R09: 0000000000002cf3 [ 1106.798594] R10: 00007f8c7dc11a70 R11: 0000000000000246 R12: 0000000000000000 [ 1106.806030] R13: 00007ffd6f52de00 R14: 0000000000000005 R15: 0000000000000005 [ 1106.813315] INFO: task udevd:11864 blocked for more than 140 seconds. [ 1106.819920] Not tainted 5.0.0-rc2+ #29 [ 1106.824322] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1106.832335] udevd D24168 11864 3865 0x00000000 [ 1106.838011] Call Trace: [ 1106.840604] __schedule+0x897/0x1e60 [ 1106.844308] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1106.849359] ? mark_held_locks+0xb1/0x100 [ 1106.853506] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1106.858394] ? mark_held_locks+0xb1/0x100 [ 1106.862543] ? _raw_spin_unlock_irq+0x28/0x90 [ 1106.867102] schedule+0xfe/0x350 [ 1106.870468] ? kasan_check_read+0x11/0x20 [ 1106.874600] ? __schedule+0x1e60/0x1e60 [ 1106.878606] ? trace_hardirqs_off_caller+0x300/0x300 [ 1106.883710] ? do_raw_spin_trylock+0x270/0x270 [ 1106.888335] ? try_to_wake_up+0xf9/0x1480 [ 1106.892480] ? mark_held_locks+0x100/0x100 [ 1106.896777] rwsem_down_read_failed+0x360/0x6d0 [ 1106.901447] ? rt_mutex_futex_unlock+0x120/0x120 [ 1106.906273] ? lock_downgrade+0x910/0x910 [ 1106.910420] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1106.915775] ? rcuwait_wake_up+0x1c8/0x300 [ 1106.920025] ? check_preemption_disabled+0x48/0x290 [ 1106.925097] call_rwsem_down_read_failed+0x18/0x30 [ 1106.930031] __percpu_down_read+0x142/0x1d0 [ 1106.934338] ? percpu_free_rwsem+0xa0/0xa0 [ 1106.938613] ? rcu_read_lock_sched_held+0x110/0x130 [ 1106.943644] uprobe_start_dup_mmap+0xbf/0xe0 [ 1106.948120] copy_process+0x3041/0x8710 [ 1106.952093] ? is_bpf_text_address+0xac/0x170 [ 1106.956648] ? find_held_lock+0x35/0x120 [ 1106.960711] ? is_bpf_text_address+0xac/0x170 [ 1106.965281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1106.970830] ? __cleanup_sighand+0x70/0x70 [ 1106.975121] ? print_usage_bug+0xd0/0xd0 [ 1106.979190] ? unwind_get_return_address+0x61/0xa0 [ 1106.984129] ? create_pipe_files+0x478/0x730 [ 1106.988588] ? __do_pipe_flags+0x48/0x250 [ 1106.992735] ? print_usage_bug+0xd0/0xd0 [ 1106.996845] ? __lock_acquire+0x572/0x4a30 [ 1107.001075] ? __do_pipe_flags+0x48/0x250 [ 1107.005300] ? mark_held_locks+0x100/0x100 [ 1107.009543] ? __lock_acquire+0x572/0x4a30 [ 1107.013778] ? add_lock_to_list.isra.0+0x450/0x450 [ 1107.018772] ? selinux_file_alloc_security+0xb4/0x190 [ 1107.023974] ? mark_held_locks+0x100/0x100 [ 1107.028285] ? __alloc_fd+0x549/0x700 [ 1107.032082] ? add_lock_to_list.isra.0+0x450/0x450 [ 1107.037073] ? __fd_install+0x2a0/0x8c0 [ 1107.041042] ? find_held_lock+0x35/0x120 [ 1107.045138] ? __fd_install+0x2a0/0x8c0 [ 1107.049113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.054636] ? lock_downgrade+0x910/0x910 [ 1107.058820] ? kasan_check_read+0x11/0x20 [ 1107.062968] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1107.068324] ? rcu_softirq_qs+0x20/0x20 [ 1107.072317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.077910] _do_fork+0x1a9/0x1170 [ 1107.081457] ? fork_idle+0x1d0/0x1d0 [ 1107.085241] ? fd_install+0x4d/0x60 [ 1107.088884] ? do_syscall_64+0x8c/0x800 [ 1107.092841] ? do_syscall_64+0x8c/0x800 [ 1107.096873] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1107.101455] ? trace_hardirqs_on+0xbd/0x310 [ 1107.105816] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.111183] ? trace_hardirqs_off_caller+0x300/0x300 [ 1107.116361] __x64_sys_clone+0xbf/0x150 [ 1107.120335] do_syscall_64+0x1a3/0x800 [ 1107.124209] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1107.129336] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1107.134353] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1107.139265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.144463] RIP: 0033:0x7f8c7d2f4f46 [ 1107.148255] Code: Bad RIP value. [ 1107.151617] RSP: 002b:00007ffd6f52dde0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1107.159355] RAX: ffffffffffffffda RBX: 00007ffd6f52dde0 RCX: 00007f8c7d2f4f46 [ 1107.166670] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1107.173935] RBP: 00007ffd6f52de40 R08: 0000000000002e58 R09: 0000000000002e58 [ 1107.181263] R10: 00007f8c7dc11a70 R11: 0000000000000246 R12: 0000000000000000 [ 1107.188557] R13: 00007ffd6f52de00 R14: 0000000000000005 R15: 0000000000000005 [ 1107.195896] INFO: task udevd:11995 blocked for more than 140 seconds. [ 1107.202467] Not tainted 5.0.0-rc2+ #29 [ 1107.206917] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1107.214918] udevd D25032 11995 3865 0x00000000 [ 1107.220555] Call Trace: [ 1107.223137] __schedule+0x897/0x1e60 [ 1107.226888] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1107.231906] ? mark_held_locks+0xb1/0x100 [ 1107.236099] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1107.240940] ? mark_held_locks+0xb1/0x100 [ 1107.245141] ? _raw_spin_unlock_irq+0x28/0x90 [ 1107.249644] schedule+0xfe/0x350 [ 1107.253006] ? kasan_check_read+0x11/0x20 [ 1107.257212] ? __schedule+0x1e60/0x1e60 [ 1107.261195] ? trace_hardirqs_off_caller+0x300/0x300 [ 1107.266351] ? do_raw_spin_trylock+0x270/0x270 [ 1107.270935] ? try_to_wake_up+0xf9/0x1480 [ 1107.275125] ? mark_held_locks+0x100/0x100 [ 1107.279375] rwsem_down_read_failed+0x360/0x6d0 [ 1107.284040] ? rt_mutex_futex_unlock+0x120/0x120 [ 1107.288972] ? lock_downgrade+0x910/0x910 [ 1107.293112] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1107.298457] ? rcuwait_wake_up+0x1c8/0x300 [ 1107.302704] ? check_preemption_disabled+0x48/0x290 [ 1107.307780] call_rwsem_down_read_failed+0x18/0x30 [ 1107.312721] __percpu_down_read+0x142/0x1d0 [ 1107.317097] ? percpu_free_rwsem+0xa0/0xa0 [ 1107.321341] ? rcu_read_lock_sched_held+0x110/0x130 [ 1107.326488] uprobe_start_dup_mmap+0xbf/0xe0 [ 1107.330899] copy_process+0x3041/0x8710 [ 1107.334984] ? is_bpf_text_address+0xac/0x170 [ 1107.339476] ? find_held_lock+0x35/0x120 [ 1107.343524] ? is_bpf_text_address+0xac/0x170 [ 1107.348067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.353614] ? __cleanup_sighand+0x70/0x70 [ 1107.357968] ? print_usage_bug+0xd0/0xd0 [ 1107.362036] ? unwind_get_return_address+0x61/0xa0 [ 1107.367313] ? create_pipe_files+0x478/0x730 [ 1107.371719] ? __do_pipe_flags+0x48/0x250 [ 1107.375981] ? print_usage_bug+0xd0/0xd0 [ 1107.380040] ? __lock_acquire+0x572/0x4a30 [ 1107.384271] ? __do_pipe_flags+0x48/0x250 [ 1107.388479] ? mark_held_locks+0x100/0x100 [ 1107.392711] ? __lock_acquire+0x572/0x4a30 [ 1107.396996] ? add_lock_to_list.isra.0+0x450/0x450 [ 1107.401934] ? selinux_file_alloc_security+0xb4/0x190 [ 1107.407192] ? mark_held_locks+0x100/0x100 [ 1107.411437] ? __alloc_fd+0x549/0x700 [ 1107.415307] ? add_lock_to_list.isra.0+0x450/0x450 [ 1107.420253] ? __fd_install+0x2a0/0x8c0 [ 1107.424212] ? find_held_lock+0x35/0x120 [ 1107.428341] ? __fd_install+0x2a0/0x8c0 [ 1107.432316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.437890] ? lock_downgrade+0x910/0x910 [ 1107.442043] ? kasan_check_read+0x11/0x20 [ 1107.446272] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1107.451566] ? rcu_softirq_qs+0x20/0x20 [ 1107.455615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.461166] _do_fork+0x1a9/0x1170 [ 1107.464703] ? fork_idle+0x1d0/0x1d0 [ 1107.468468] ? fd_install+0x4d/0x60 [ 1107.472095] ? do_syscall_64+0x8c/0x800 [ 1107.476129] ? do_syscall_64+0x8c/0x800 [ 1107.480103] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1107.484673] ? trace_hardirqs_on+0xbd/0x310 [ 1107.489083] ? __do_page_fault+0x3f1/0xd60 [ 1107.493316] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.498715] ? trace_hardirqs_off_caller+0x300/0x300 [ 1107.503824] __x64_sys_clone+0xbf/0x150 [ 1107.507868] do_syscall_64+0x1a3/0x800 [ 1107.511763] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1107.516755] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1107.521773] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1107.527300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.532480] RIP: 0033:0x7f8c7d2f4f46 [ 1107.536275] Code: Bad RIP value. [ 1107.539638] RSP: 002b:00007ffd6f52dde0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1107.547772] RAX: ffffffffffffffda RBX: 00007ffd6f52dde0 RCX: 00007f8c7d2f4f46 [ 1107.555064] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1107.562318] RBP: 00007ffd6f52de40 R08: 0000000000002edb R09: 0000000000002edb [ 1107.569639] R10: 00007f8c7dc11a70 R11: 0000000000000246 R12: 0000000000000000 [ 1107.576932] R13: 00007ffd6f52de00 R14: 0000000000000005 R15: 0000000000000005 [ 1107.584207] INFO: task syz-executor0:13216 blocked for more than 140 seconds. [ 1107.591625] Not tainted 5.0.0-rc2+ #29 [ 1107.596147] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1107.604106] syz-executor0 D20440 13216 1 0x00000004 [ 1107.609848] Call Trace: [ 1107.612439] __schedule+0x897/0x1e60 [ 1107.616203] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1107.621246] ? mark_held_locks+0xb1/0x100 [ 1107.625458] ? rwsem_down_read_failed+0x32e/0x6d0 [ 1107.630312] ? mark_held_locks+0xb1/0x100 [ 1107.634459] ? _raw_spin_unlock_irq+0x28/0x90 [ 1107.639005] schedule+0xfe/0x350 [ 1107.642371] ? kasan_check_read+0x11/0x20 [ 1107.646568] ? __schedule+0x1e60/0x1e60 [ 1107.650544] ? trace_hardirqs_off_caller+0x300/0x300 [ 1107.655700] ? do_raw_spin_trylock+0x270/0x270 [ 1107.660293] ? try_to_wake_up+0xf9/0x1480 [ 1107.664432] ? mark_held_locks+0x100/0x100 [ 1107.668708] rwsem_down_read_failed+0x360/0x6d0 [ 1107.673389] ? rt_mutex_futex_unlock+0x120/0x120 [ 1107.678201] ? lock_downgrade+0x910/0x910 [ 1107.682373] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1107.687723] ? rcuwait_wake_up+0x1c8/0x300 [ 1107.691961] ? check_preemption_disabled+0x48/0x290 [ 1107.697014] call_rwsem_down_read_failed+0x18/0x30 [ 1107.701946] __percpu_down_read+0x142/0x1d0 [ 1107.706325] ? percpu_free_rwsem+0xa0/0xa0 [ 1107.710808] ? rcu_read_lock_sched_held+0x110/0x130 [ 1107.715887] uprobe_start_dup_mmap+0xbf/0xe0 [ 1107.720296] copy_process+0x3041/0x8710 [ 1107.724258] ? page_swapcount+0x1c0/0x1c0 [ 1107.728475] ? __cleanup_sighand+0x70/0x70 [ 1107.732712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.738315] ? reuse_swap_page+0x453/0x14a0 [ 1107.742637] ? swp_swapcount+0x540/0x540 [ 1107.746768] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1107.752308] ? __lock_acquire+0x572/0x4a30 [ 1107.756594] ? do_raw_spin_trylock+0x270/0x270 [ 1107.761186] ? mark_held_locks+0x100/0x100 [ 1107.765508] ? finish_mkwrite_fault+0x540/0x540 [ 1107.770174] ? kasan_check_read+0x11/0x20 [ 1107.774312] ? do_raw_spin_lock+0x156/0x360 [ 1107.778700] ? rwlock_bug.part.0+0x90/0x90 [ 1107.782934] ? pmd_devmap_trans_unstable+0x1d0/0x1d0 [ 1107.788076] ? add_lock_to_list.isra.0+0x450/0x450 [ 1107.793006] ? add_lock_to_list.isra.0+0x450/0x450 [ 1107.797989] ? __handle_mm_fault+0x955/0x55a0 [ 1107.802484] ? __might_fault+0x12b/0x1e0 [ 1107.806602] ? find_held_lock+0x35/0x120 [ 1107.810664] ? __might_fault+0x12b/0x1e0 [ 1107.814714] ? lock_acquire+0x1db/0x570 [ 1107.818729] ? lock_downgrade+0x910/0x910 [ 1107.822883] ? lock_release+0xc40/0xc40 [ 1107.826936] ? trace_hardirqs_off_caller+0x300/0x300 [ 1107.832058] _do_fork+0x1a9/0x1170 [ 1107.835670] ? fork_idle+0x1d0/0x1d0 [ 1107.839393] ? kasan_check_read+0x11/0x20 [ 1107.843539] ? _copy_to_user+0xc9/0x120 [ 1107.847649] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1107.853188] ? put_timespec64+0x115/0x1b0 [ 1107.857388] ? nsecs_to_jiffies+0x30/0x30 [ 1107.861537] ? vmacache_update+0x114/0x140 [ 1107.865825] ? do_syscall_64+0x8c/0x800 [ 1107.869808] ? do_syscall_64+0x8c/0x800 [ 1107.873779] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1107.878395] ? trace_hardirqs_on+0xbd/0x310 [ 1107.882717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1107.888293] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.893656] ? trace_hardirqs_off_caller+0x300/0x300 [ 1107.898821] __x64_sys_clone+0xbf/0x150 [ 1107.902793] do_syscall_64+0x1a3/0x800 [ 1107.906735] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1107.911662] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1107.916732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1107.921579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1107.926821] RIP: 0033:0x45649a [ 1107.930013] Code: Bad RIP value. [ 1107.933358] RSP: 002b:00007ffddeaa6de0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1107.941094] RAX: ffffffffffffffda RBX: 00007ffddeaa6de0 RCX: 000000000045649a [ 1107.948385] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1107.955713] RBP: 00007ffddeaa6e20 R08: 0000000000000001 R09: 0000000001477940 [ 1107.962989] R10: 0000000001477c10 R11: 0000000000000246 R12: 0000000000000001 [ 1107.970292] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1107.977625] [ 1107.977625] Showing all locks held in the system: [ 1107.983935] 1 lock held by khungtaskd/1041: [ 1107.988306] #0: 00000000fd5baf96 (rcu_read_lock){....}, at: debug_show_all_locks+0xc6/0x41d [ 1107.996966] 2 locks held by rs:main Q:Reg/7910: [ 1108.001614] #0: 00000000a6b95fe7 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1b3/0x1f0 [ 1108.009639] #1: 00000000fd5baf96 (rcu_read_lock){....}, at: __update_idle_core+0xa8/0x5c0 [ 1108.018111] 1 lock held by rsyslogd/7912: [ 1108.022294] #0: 0000000032640787 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1b3/0x1f0 [ 1108.030311] 2 locks held by getty/8035: [ 1108.034280] #0: 00000000a1a38ead (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1108.042577] #1: 000000004dd9904b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1108.051558] 2 locks held by getty/8036: [ 1108.055562] #0: 000000004c61821f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1108.063808] #1: 000000009a0ec87e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1108.072692] 2 locks held by getty/8037: [ 1108.076703] #0: 0000000019fde05c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1108.084985] #1: 00000000b1738195 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1108.093837] 2 locks held by getty/8038: [ 1108.097832] #0: 000000002ed8bc22 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1108.106101] #1: 00000000186cf578 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1108.115006] 2 locks held by getty/8039: [ 1108.118973] #0: 00000000188ce2de (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1108.127270] #1: 000000009379f1a2 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1108.136153] 2 locks held by getty/8040: [ 1108.140119] #0: 000000004cd5143a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1108.148412] #1: 000000004cca15f5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1108.157331] 2 locks held by getty/8041: [ 1108.161285] #0: 00000000be83d018 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1108.169625] #1: 0000000013528da5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 1108.178559] 1 lock held by syz-executor1/8074: [ 1108.183139] #0: 000000006f47e19a (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1108.191372] 1 lock held by syz-executor2/8076: [ 1108.195982] #0: 000000006f47e19a (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1108.204147] 1 lock held by syz-executor3/8079: [ 1108.208782] #0: 000000006f47e19a (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1108.216978] 1 lock held by syz-executor5/8087: [ 1108.221542] #0: 000000006f47e19a (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1108.229741] 1 lock held by udevd/9351: [ 1108.233619] #0: 000000006f47e19a (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1108.241811] 1 lock held by udevd/9352: [ 1108.245727] #0: 000000006f47e19a (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1108.253894] 1 lock held by udevd/11507: [ 1108.257891] #0: 000000006f47e19a (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1108.266084] 1 lock held by udevd/11864: [ 1108.270037] #0: 000000006f47e19a (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1108.278265] 1 lock held by udevd/11995: [ 1108.282231] #0: 000000006f47e19a (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1108.290418] 1 lock held by syz-executor0/13216: [ 1108.295130] #0: 000000006f47e19a (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1108.303307] 1 lock held by syz-executor3/13480: [ 1108.308000] #0: 000000006f47e19a (&dup_mmap_sem){++++}, at: copy_process+0x3041/0x8710 [ 1108.316211] 5 locks held by syz-executor4/24874: [ 1108.320949] #0: 0000000022a24284 (&sig->cred_guard_mutex){+.+.}, at: __do_sys_perf_event_open+0x9c3/0x2f00 [ 1108.330892] #1: 000000006916a5cf (&pmus_srcu){....}, at: perf_event_alloc.part.0+0x10c1/0x3520 [ 1108.339772] #2: 000000004fa6197c (event_mutex){+.+.}, at: perf_uprobe_init+0x1d0/0x290 [ 1108.347978] #3: 000000007a9067f0 (&uprobe->register_rwsem){+.+.}, at: __uprobe_register+0x465/0x8e0 [ 1108.357287] #4: 000000006f47e19a (&dup_mmap_sem){++++}, at: percpu_down_write+0x9a/0x540 [ 1108.365665] [ 1108.367292] ============================================= [ 1108.367292] [ 1108.374295] NMI backtrace for cpu 0 [ 1108.377957] CPU: 0 PID: 1041 Comm: khungtaskd Not tainted 5.0.0-rc2+ #29 [ 1108.384788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.394143] Call Trace: [ 1108.396736] dump_stack+0x1db/0x2d0 [ 1108.400352] ? dump_stack_print_info.cold+0x20/0x20 [ 1108.405354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.410876] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1108.415418] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1108.420330] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 1108.425590] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1108.430759] watchdog+0xbbb/0x1170 [ 1108.434286] ? reset_hung_task_detector+0xd0/0xd0 [ 1108.439112] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1108.443679] ? trace_hardirqs_on+0xbd/0x310 [ 1108.447982] ? kasan_check_read+0x11/0x20 [ 1108.452111] ? __kthread_parkme+0xc3/0x1b0 [ 1108.456325] ? trace_hardirqs_off_caller+0x300/0x300 [ 1108.461408] ? do_raw_spin_trylock+0x270/0x270 [ 1108.465969] ? schedule+0x108/0x350 [ 1108.469576] ? do_raw_spin_trylock+0x270/0x270 [ 1108.474143] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1108.479239] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1108.484757] ? __kthread_parkme+0xfb/0x1b0 [ 1108.488972] kthread+0x357/0x430 [ 1108.492316] ? reset_hung_task_detector+0xd0/0xd0 [ 1108.497136] ? kthread_stop+0x920/0x920 [ 1108.501102] ret_from_fork+0x3a/0x50 [ 1108.504887] Sending NMI from CPU 0 to CPUs 1: [ 1108.509429] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x2/0x10 [ 1108.510388] Kernel panic - not syncing: hung_task: blocked tasks [ 1108.523095] CPU: 0 PID: 1041 Comm: khungtaskd Not tainted 5.0.0-rc2+ #29 [ 1108.529927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.539274] Call Trace: [ 1108.541846] dump_stack+0x1db/0x2d0 [ 1108.545462] ? dump_stack_print_info.cold+0x20/0x20 [ 1108.550470] panic+0x2cb/0x65c [ 1108.553653] ? add_taint.cold+0x16/0x16 [ 1108.557613] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1108.562654] ? printk_safe_flush+0xf2/0x140 [ 1108.566974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.572517] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1108.577440] ? nmi_trigger_cpumask_backtrace+0x1a7/0x236 [ 1108.582887] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1108.588335] watchdog+0xbcc/0x1170 [ 1108.591862] ? reset_hung_task_detector+0xd0/0xd0 [ 1108.596695] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1108.601274] ? trace_hardirqs_on+0xbd/0x310 [ 1108.605578] ? kasan_check_read+0x11/0x20 [ 1108.609706] ? __kthread_parkme+0xc3/0x1b0 [ 1108.613920] ? trace_hardirqs_off_caller+0x300/0x300 [ 1108.619003] ? do_raw_spin_trylock+0x270/0x270 [ 1108.623565] ? schedule+0x108/0x350 [ 1108.627181] ? do_raw_spin_trylock+0x270/0x270 [ 1108.631748] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1108.636832] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1108.642350] ? __kthread_parkme+0xfb/0x1b0 [ 1108.646568] kthread+0x357/0x430 [ 1108.649917] ? reset_hung_task_detector+0xd0/0xd0 [ 1108.654736] ? kthread_stop+0x920/0x920 [ 1108.658951] ret_from_fork+0x3a/0x50 [ 1108.663978] Kernel Offset: disabled [ 1108.667603] Rebooting in 86400 seconds..