000080)) syz_open_pts(0xffffffffffffffff, 0x0) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 12:58:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 12:58:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0xffffffff, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000000)) 12:58:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0xee01) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000000)) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) 12:58:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 12:58:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) eventfd2(0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = eventfd2(0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) read$midi(0xffffffffffffffff, &(0x7f00000001c0)=""/225, 0xe1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$pppl2tp(r4, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x4, 0x0, 0x2, {0xa, 0x4e22, 0x3f, @remote, 0x4}}}, 0x32) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = eventfd2(0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r10, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) 12:58:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) eventfd2(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:58:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = eventfd2(0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:58:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) 12:58:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 506.516080][T16692] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (16692) 12:58:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada", 0x65, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 506.690383][ C0] net_ratelimit: 22 callbacks suppressed [ 506.690392][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 506.701928][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 506.751325][T16702] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop2 scanned by syz-executor.2 (16702) 12:58:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) setresuid(0x0, r5, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) 12:58:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d8", 0x4d, 0x10000}], 0x0, 0x0) 12:58:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada", 0x65, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4bfa, &(0x7f0000000180)={0x0, 0x0}) 12:58:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) 12:58:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = eventfd2(0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x27) setresuid(0x0, r5, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) [ 507.204875][T16743] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop2 scanned by syz-executor.2 (16743) [ 507.296986][T16743] BTRFS error (device loop2): unsupported checksum algorithm: 18459 12:58:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 507.400402][T16743] BTRFS error (device loop2): open_ctree failed [ 507.410559][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 507.416805][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:58:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 12:58:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="927f85abac58a0913dbb5a6e4ffc5ee119583b6cfc0b82de0a59d9c24195653d322d490ce3a3cf0d52e0cb61d04b18a39973e920d5464948b372c02596d53c62152c3e4a3cc786e9028cbfe68078254df0e60a6e4ed7ca8081ad68f6e1f4dd8a0fd14de94b5782804eca389903f7fc000b8df3f89721a6469722aac9a531246043b189c12d819d4e13fd2ddd6077cfa8cbfb4a17cf69d7b028c783584e08391cfa9239fd6d5453f86fbf9d24a416ca844604e999519c3c7448ddb182835e749b6c0352a396a28f75a56578d3276f7d8fe6c224ee42b7f14f603a5dffae1a"], 0x1, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) 12:58:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) 12:58:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) 12:58:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 507.730421][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 507.736219][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:58:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = eventfd2(0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f00000001c0)={0x40, "f1b91d118fad071cbc602cbf4d9d9d2faef9cf1eed87a416104c554215881e53067ad4e937acdf474677a3df96eb43b420dee1e0bd6e809b4ba046caf7b2ab778a8b2771cf42ec58374427bb829d165cde3bc805f95a8dc81c5f41c50f5eec0a43c2992f521e4c076f6ea0fe0082159e0a8b0a998af6764c96d234603c8f024c4e9b173fd17c3d7d8bdd4fdc17a290bbc980b588ea7e4290f8a2e0552fdaff4444e6b4c3dc97c3e1bc752d115de5d19b6d3693b02893f6614c7f08d51226b92195b74d44241e62002f7dd6a784a358f4a91abc8ede872c5f89b49be3a1e5c99a41b6f3ab860695ba7a7610f4b70fff7e39c7d0ef04031800118bd28c71f69585c8048461407c91725855d60b923fc0fc7d83b41e8174a8ef9d8f214992681baf929d5ab6158b01f91a3b6f643b01436e4bd8b36d08af439dcd9a0a687178d730180785f1a2991e5e1a737b461dd2c9e2c5b2259e2495a23c89375d872d9182c0ea6e5c711689a45c3e6734f2020f484c15dd99b22e9d5ee3ccac68b1c328ef72cc1174f82b9843226a3ea8d855979226052b0bd2c1f2708368b8a44fc8d2adc35f565fc0f8d85b80f608cb03b6f891a82fb5bbee2290183fcbd732f2d3ca8b6dc1facea550d1ec81da9b1d12479ba2e3b608495d093487854612c24ca60a363e28cd096d90f7f3e4676551a38f506475c1c51474f8dc9647fc3946c5be474ea6"}) r5 = eventfd2(0x0, 0x0) r6 = fcntl$dupfd(r1, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) [ 507.890401][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 507.896219][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:58:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x7e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) [ 507.926481][T16789] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop2 scanned by syz-executor.2 (16789) [ 507.959307][T16789] BTRFS error (device loop2): unsupported checksum algorithm: 18459 [ 508.040405][T16789] BTRFS error (device loop2): open_ctree failed 12:58:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) [ 508.140408][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 508.146331][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:58:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$CAPI_NCCI_GETUNIT(r3, 0x80044327, &(0x7f0000000040)=0xa89b) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setfsuid(r8) setresuid(r8, r6, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) [ 508.247611][T16807] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (16807) [ 508.316517][T16807] BTRFS error (device loop3): unsupported checksum algorithm: 18459 12:58:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) 12:58:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setfsuid(r7) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setfsuid(r9) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setfsuid(r11) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setfsuid(r13) setresuid(r5, r9, r13) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) [ 508.450461][T16807] BTRFS error (device loop3): open_ctree failed 12:58:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x7e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 508.585050][T16824] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop2 scanned by syz-executor.2 (16824) [ 508.645631][T16824] BTRFS error (device loop2): unsupported checksum algorithm: 18459 [ 508.710490][T16824] BTRFS error (device loop2): open_ctree failed 12:58:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x7e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) 12:58:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$binfmt_elf32(r6, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x1, 0x4, 0x24, 0x2e1, 0x2, 0x3, 0x81, 0x104, 0x38, 0x0, 0xffff, 0x8, 0x20, 0x2, 0xffff, 0x81, 0x3426}, [{0x6, 0x4, 0x80000000, 0x73c, 0x1000, 0x10000, 0x7, 0x1}, {0x60000000, 0x800, 0x7, 0x3, 0xffffffff, 0x0, 0x1, 0x1f}], "51b3bedc583c56a25826a18bea7ef14d09668652b2110e01ba553b685a6c92377bfc3f27487ea7fec64c3d17e8f6db4091ac2b67f7d1ed1f2f54d100ff4024a5a0d72321c3b6ef06daed884394db04b83487c09a004093c57ee5309ce737de0ac70bed844933e3088ebe91b2f4738e96c3949e83e474a2e3f28de2fa1c8192993931f3df36b3c113d60a8a8fa85540b5d9b5be4a87802d4f23562ece0fec9874326e20b5e2cb459dad8eff0104187d", [[], [], [], [], []]}, 0x627) setresuid(0x0, r5, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) 12:58:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 509.085045][T16855] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (16855) [ 509.102078][T16855] BTRFS error (device loop3): unsupported checksum algorithm: 18459 12:58:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 509.153563][T16855] BTRFS error (device loop3): open_ctree failed 12:58:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) 12:58:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x7e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) 12:58:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x7e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x48, r2, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x48}, 0x1, 0xffffff9e}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r2, 0x622, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x80}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x100}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7f}]}, 0x34}, 0x1, 0x0, 0x0, 0x90}, 0x880) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = eventfd2(0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$VIDIOC_G_CTRL(r5, 0xc008561b, &(0x7f0000000280)={0x2, 0x80000000}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0xee01) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f00000001c0)={0x8, 0x3f, 0xe4, 0x9}) 12:58:13 executing program 1 (fault-call:1 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 509.720667][T16896] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (16896) [ 509.749463][T16896] BTRFS error (device loop3): unsupported checksum algorithm: 18459 12:58:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 509.818588][T16905] FAULT_INJECTION: forcing a failure. [ 509.818588][T16905] name failslab, interval 1, probability 0, space 0, times 1 [ 509.840684][T16896] BTRFS error (device loop3): open_ctree failed [ 509.890494][T16905] CPU: 0 PID: 16905 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 509.900011][T16905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.910209][T16905] Call Trace: [ 509.913531][T16905] dump_stack+0x11d/0x181 [ 509.917976][T16905] should_fail.cold+0xa/0x1a [ 509.922643][T16905] __should_failslab+0xee/0x130 [ 509.928070][T16905] should_failslab+0x9/0x14 [ 509.932600][T16905] __kmalloc+0x53/0x690 [ 509.936808][T16905] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 509.943404][T16905] ? fput_many+0xec/0x130 [ 509.947871][T16905] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 509.956841][T16905] ? strnlen_user+0x1a8/0x220 [ 509.961523][T16905] ? __x64_sys_memfd_create+0xdb/0x370 [ 509.967071][T16905] __x64_sys_memfd_create+0xdb/0x370 [ 509.972499][T16905] do_syscall_64+0xcc/0x3a0 [ 509.977022][T16905] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 509.982962][T16905] RIP: 0033:0x45b349 [ 509.987006][T16905] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 510.007871][T16905] RSP: 002b:00007f16c48e7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 510.016319][T16905] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 000000000045b349 [ 510.024825][T16905] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 510.032813][T16905] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 12:58:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 510.040890][T16905] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 510.048956][T16905] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000000 12:58:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = eventfd2(0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$NFQNL_MSG_VERDICT_BATCH(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x3, 0x3, 0x3, 0x0, 0x0, {0x3, 0x0, 0x3}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000804}, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) 12:58:13 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:13 executing program 1 (fault-call:1 fault-nth:1): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 510.419037][T16931] FAULT_INJECTION: forcing a failure. [ 510.419037][T16931] name failslab, interval 1, probability 0, space 0, times 0 [ 510.449766][T16931] CPU: 0 PID: 16931 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 510.458840][T16931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.469424][T16931] Call Trace: [ 510.472728][T16931] dump_stack+0x11d/0x181 [ 510.477076][T16931] should_fail.cold+0xa/0x1a [ 510.481717][T16931] __should_failslab+0xee/0x130 [ 510.486587][T16931] should_failslab+0x9/0x14 [ 510.491140][T16931] __kmalloc+0x53/0x690 [ 510.495394][T16931] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 510.501656][T16931] ? fput_many+0xec/0x130 [ 510.506037][T16931] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 510.512286][T16931] ? strnlen_user+0x1a8/0x220 12:58:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 510.517159][T16931] ? __x64_sys_memfd_create+0xdb/0x370 [ 510.522642][T16931] __x64_sys_memfd_create+0xdb/0x370 [ 510.529050][T16931] do_syscall_64+0xcc/0x3a0 [ 510.533772][T16931] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 510.539881][T16931] RIP: 0033:0x45b349 [ 510.543831][T16931] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:58:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x280001, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x21, &(0x7f00000001c0)="e2cc698b970d422aea67986d3fa9eadf9be47ff21172f283524b65aaac027ea97fdd0b8b07e73b2b03f8c54f4eadba985342379c17ce524ce33608625f28d899bab1c3fab5505129b0a11919d19106b7f3abb5454443f1034f2aa47dfc944257ce06b3a42927bb4366022e42af9876c1f1601530ac0ed0565149b5955cb4532dd0075292252fb40061f5fc4528acd9c1540090e045cbbd0e3029da718a328f65d9735d4cfb8db81b0f6976584e703b14c79d7f85fb6176d7f342a03a12f1b3b26218ba6e544e305ebee8389304f8297b3625a097fd93e57a339ec81c4df4df05d1e5aabbd79b", 0xe6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) [ 510.563483][T16931] RSP: 002b:00007fb65ee01a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 510.572168][T16931] RAX: ffffffffffffffda RBX: 00007fb65ee026d4 RCX: 000000000045b349 [ 510.580254][T16931] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 510.588762][T16931] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 510.596742][T16931] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 510.605137][T16931] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000000 [ 510.661083][T16942] FAULT_INJECTION: forcing a failure. [ 510.661083][T16942] name failslab, interval 1, probability 0, space 0, times 0 [ 510.710489][T16942] CPU: 0 PID: 16942 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 510.719326][T16942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.729384][T16942] Call Trace: [ 510.732743][T16942] dump_stack+0x11d/0x181 [ 510.737205][T16942] should_fail.cold+0xa/0x1a [ 510.741828][T16942] __should_failslab+0xee/0x130 [ 510.746709][T16942] should_failslab+0x9/0x14 [ 510.751236][T16942] kmem_cache_alloc+0x29/0x5d0 [ 510.756134][T16942] ? _kstrtoull+0xfc/0x130 [ 510.760595][T16942] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 510.766340][T16942] ? shmem_destroy_inode+0x70/0x70 [ 510.771608][T16942] shmem_alloc_inode+0x31/0x60 [ 510.776392][T16942] alloc_inode+0x48/0x130 [ 510.780769][T16942] new_inode_pseudo+0x35/0xe0 [ 510.785472][T16942] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 510.791729][T16942] new_inode+0x28/0x50 [ 510.795947][T16942] shmem_get_inode+0x85/0x490 [ 510.800675][T16942] ? _raw_spin_unlock+0x4b/0x60 [ 510.805607][T16942] __shmem_file_setup.part.0+0x6f/0x1f0 [ 510.811172][T16942] shmem_file_setup+0x7b/0xa0 [ 510.815991][T16942] __x64_sys_memfd_create+0x20d/0x370 [ 510.821414][T16942] do_syscall_64+0xcc/0x3a0 [ 510.825969][T16942] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 510.831897][T16942] RIP: 0033:0x45b349 [ 510.835887][T16942] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 510.855504][T16942] RSP: 002b:00007f16c48e7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 510.863952][T16942] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 000000000045b349 [ 510.872169][T16942] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 510.880233][T16942] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 510.888223][T16942] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 510.896300][T16942] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000001 12:58:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:14 executing program 1 (fault-call:1 fault-nth:2): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:14 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 511.110980][T16964] FAULT_INJECTION: forcing a failure. [ 511.110980][T16964] name failslab, interval 1, probability 0, space 0, times 0 [ 511.140394][T16964] CPU: 0 PID: 16964 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 511.149235][T16964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.159294][T16964] Call Trace: [ 511.162610][T16964] dump_stack+0x11d/0x181 [ 511.166972][T16964] should_fail.cold+0xa/0x1a [ 511.171588][T16964] __should_failslab+0xee/0x130 [ 511.176456][T16964] should_failslab+0x9/0x14 [ 511.180976][T16964] kmem_cache_alloc+0x29/0x5d0 [ 511.185764][T16964] ? __write_once_size+0x5a/0xe0 [ 511.190924][T16964] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 511.196952][T16964] __d_alloc+0x52/0x4b0 [ 511.201266][T16964] ? timestamp_truncate+0x11b/0x160 [ 511.206504][T16964] d_alloc_pseudo+0x27/0x70 12:58:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 511.211043][T16964] alloc_file_pseudo+0x96/0x1b0 [ 511.215955][T16964] __shmem_file_setup.part.0+0xd4/0x1f0 [ 511.221524][T16964] shmem_file_setup+0x7b/0xa0 [ 511.226219][T16964] __x64_sys_memfd_create+0x20d/0x370 [ 511.231610][T16964] do_syscall_64+0xcc/0x3a0 [ 511.236158][T16964] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 511.242060][T16964] RIP: 0033:0x45b349 [ 511.245962][T16964] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 511.265712][T16964] RSP: 002b:00007f16c48e7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 511.274211][T16964] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 000000000045b349 [ 511.282190][T16964] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 511.290307][T16964] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 511.298348][T16964] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 12:58:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd2(0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) openat$cgroup_ro(r3, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0xee01) ioctl$GIO_UNIMAP(r0, 0x4b4a, &(0x7f0000000180)={0x0, 0x0}) [ 511.306452][T16964] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000002 [ 511.386140][T16978] FAULT_INJECTION: forcing a failure. [ 511.386140][T16978] name failslab, interval 1, probability 0, space 0, times 0 [ 511.438398][T16978] CPU: 0 PID: 16978 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 511.447114][T16978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.457205][T16978] Call Trace: [ 511.460508][T16978] dump_stack+0x11d/0x181 [ 511.465743][T16978] should_fail.cold+0xa/0x1a [ 511.470376][T16978] __should_failslab+0xee/0x130 [ 511.475248][T16978] should_failslab+0x9/0x14 [ 511.479847][T16978] kmem_cache_alloc+0x29/0x5d0 [ 511.484633][T16978] ? _kstrtoull+0xfc/0x130 [ 511.489092][T16978] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 511.494827][T16978] ? shmem_destroy_inode+0x70/0x70 [ 511.499956][T16978] shmem_alloc_inode+0x31/0x60 [ 511.504847][T16978] alloc_inode+0x48/0x130 [ 511.509243][T16978] new_inode_pseudo+0x35/0xe0 [ 511.513945][T16978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 511.520206][T16978] new_inode+0x28/0x50 [ 511.524290][T16978] shmem_get_inode+0x85/0x490 [ 511.528988][T16978] ? _raw_spin_unlock+0x4b/0x60 [ 511.533988][T16978] __shmem_file_setup.part.0+0x6f/0x1f0 [ 511.539602][T16978] shmem_file_setup+0x7b/0xa0 [ 511.544342][T16978] __x64_sys_memfd_create+0x20d/0x370 [ 511.549767][T16978] do_syscall_64+0xcc/0x3a0 [ 511.554299][T16978] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 511.560231][T16978] RIP: 0033:0x45b349 [ 511.564225][T16978] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:58:14 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:14 executing program 1 (fault-call:1 fault-nth:3): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 511.584365][T16978] RSP: 002b:00007fb65ee01a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 511.592791][T16978] RAX: ffffffffffffffda RBX: 00007fb65ee026d4 RCX: 000000000045b349 [ 511.600805][T16978] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 511.608904][T16978] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 511.617041][T16978] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 511.625168][T16978] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000001 [ 511.743710][T16992] FAULT_INJECTION: forcing a failure. [ 511.743710][T16992] name failslab, interval 1, probability 0, space 0, times 0 12:58:15 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 511.818468][T16996] FAULT_INJECTION: forcing a failure. [ 511.818468][T16996] name failslab, interval 1, probability 0, space 0, times 0 [ 511.883931][T16996] CPU: 1 PID: 16996 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 511.893687][T16996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.903744][T16996] Call Trace: [ 511.907154][T16996] dump_stack+0x11d/0x181 [ 511.911566][T16996] should_fail.cold+0xa/0x1a [ 511.916204][T16996] __should_failslab+0xee/0x130 [ 511.921096][T16996] should_failslab+0x9/0x14 [ 511.925655][T16996] __kmalloc+0x53/0x690 [ 511.929843][T16996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 511.936165][T16996] ? fput_many+0xec/0x130 [ 511.940515][T16996] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 511.946885][T16996] ? strnlen_user+0x1a8/0x220 [ 511.951629][T16996] ? __x64_sys_memfd_create+0xdb/0x370 [ 511.957120][T16996] __x64_sys_memfd_create+0xdb/0x370 [ 511.962432][T16996] do_syscall_64+0xcc/0x3a0 [ 511.967045][T16996] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 511.973123][T16996] RIP: 0033:0x45b349 [ 511.977156][T17004] FAULT_INJECTION: forcing a failure. [ 511.977156][T17004] name failslab, interval 1, probability 0, space 0, times 0 [ 511.977295][T16996] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.009966][T16996] RSP: 002b:00007fb5c8214a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 512.018465][T16996] RAX: ffffffffffffffda RBX: 00007fb5c82156d4 RCX: 000000000045b349 [ 512.026523][T16996] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 512.034501][T16996] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 512.042599][T16996] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 512.050849][T16996] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000000 [ 512.059066][ C1] net_ratelimit: 18 callbacks suppressed [ 512.059077][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 512.062244][T17004] CPU: 0 PID: 17004 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 512.064962][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 512.070666][T17004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.070672][T17004] Call Trace: [ 512.070694][T17004] dump_stack+0x11d/0x181 [ 512.070728][T17004] should_fail.cold+0xa/0x1a [ 512.107520][T17004] __should_failslab+0xee/0x130 [ 512.112529][T17004] should_failslab+0x9/0x14 [ 512.117157][T17004] __kmalloc+0x53/0x690 [ 512.121338][T17004] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 512.127586][T17004] ? fput_many+0xec/0x130 [ 512.132006][T17004] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 512.138275][T17004] ? strnlen_user+0x1a8/0x220 [ 512.142993][T17004] ? __x64_sys_memfd_create+0xdb/0x370 [ 512.148464][T17004] __x64_sys_memfd_create+0xdb/0x370 [ 512.153762][T17004] do_syscall_64+0xcc/0x3a0 [ 512.158282][T17004] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 512.164182][T17004] RIP: 0033:0x45b349 [ 512.168085][T17004] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.187726][T17004] RSP: 002b:00007efec65d0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 512.196334][T17004] RAX: ffffffffffffffda RBX: 00007efec65d16d4 RCX: 000000000045b349 [ 512.204335][T17004] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 512.212328][T17004] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 512.221084][T17004] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 512.229141][T17004] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000000 [ 512.237254][T16992] CPU: 1 PID: 16992 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 512.245944][T16992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.256594][T16992] Call Trace: [ 512.259904][T16992] dump_stack+0x11d/0x181 [ 512.264726][T16992] should_fail.cold+0xa/0x1a [ 512.269338][T16992] __should_failslab+0xee/0x130 [ 512.276465][T16992] should_failslab+0x9/0x14 [ 512.281071][T16992] kmem_cache_alloc+0x29/0x5d0 [ 512.285983][T16992] ? memcg_kmem_put_cache+0x7c/0xc0 [ 512.291223][T16992] ? kmem_cache_alloc+0x1f3/0x5d0 [ 512.297231][T16992] __alloc_file+0x4d/0x210 [ 512.302526][T16992] alloc_empty_file+0x8f/0x180 [ 512.307325][T16992] alloc_file+0x4e/0x2b0 [ 512.311586][T16992] ? _raw_spin_unlock+0x4b/0x60 [ 512.316547][T16992] alloc_file_pseudo+0x11c/0x1b0 [ 512.321552][T16992] __shmem_file_setup.part.0+0xd4/0x1f0 [ 512.327119][T16992] shmem_file_setup+0x7b/0xa0 [ 512.331807][T16992] __x64_sys_memfd_create+0x20d/0x370 [ 512.337274][T16992] do_syscall_64+0xcc/0x3a0 [ 512.341984][T16992] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 512.348063][T16992] RIP: 0033:0x45b349 [ 512.351988][T16992] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.371703][T16992] RSP: 002b:00007f16c48e7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 512.380174][T16992] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 000000000045b349 [ 512.388184][T16992] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 512.396371][T16992] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 512.397507][T17016] FAULT_INJECTION: forcing a failure. [ 512.397507][T17016] name failslab, interval 1, probability 0, space 0, times 0 [ 512.404668][T16992] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 512.404678][T16992] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000003 12:58:15 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:15 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 512.404835][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 512.439348][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 512.445185][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 512.450985][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 512.456774][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 512.462542][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 512.470606][T17016] CPU: 1 PID: 17016 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 512.479371][T17016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.489439][T17016] Call Trace: [ 512.492858][T17016] dump_stack+0x11d/0x181 [ 512.497217][T17016] should_fail.cold+0xa/0x1a [ 512.501883][T17016] __should_failslab+0xee/0x130 [ 512.506813][T17016] should_failslab+0x9/0x14 [ 512.511346][T17016] kmem_cache_alloc+0x29/0x5d0 [ 512.516762][T17016] ? _kstrtoull+0xfc/0x130 [ 512.521311][T17016] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 512.527256][T17016] ? shmem_destroy_inode+0x70/0x70 [ 512.532484][T17016] shmem_alloc_inode+0x31/0x60 [ 512.537384][T17016] alloc_inode+0x48/0x130 [ 512.541744][T17016] new_inode_pseudo+0x35/0xe0 [ 512.546457][T17016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 512.552717][T17016] new_inode+0x28/0x50 [ 512.556920][T17016] shmem_get_inode+0x85/0x490 [ 512.561631][T17016] ? _raw_spin_unlock+0x4b/0x60 [ 512.566500][T17016] __shmem_file_setup.part.0+0x6f/0x1f0 [ 512.572063][T17016] shmem_file_setup+0x7b/0xa0 [ 512.576752][T17016] __x64_sys_memfd_create+0x20d/0x370 [ 512.579445][T17024] FAULT_INJECTION: forcing a failure. [ 512.579445][T17024] name failslab, interval 1, probability 0, space 0, times 0 [ 512.582147][T17016] do_syscall_64+0xcc/0x3a0 [ 512.582240][T17016] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 512.582336][T17016] RIP: 0033:0x45b349 [ 512.609216][T17016] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.628981][T17016] RSP: 002b:00007fb5c8214a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 512.637628][T17016] RAX: ffffffffffffffda RBX: 00007fb5c82156d4 RCX: 000000000045b349 [ 512.645712][T17016] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 512.653695][T17016] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 512.661759][T17016] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 512.669870][T17016] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000001 12:58:16 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 512.685425][T17024] CPU: 1 PID: 17024 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 512.694428][T17024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.704525][T17024] Call Trace: [ 512.707834][T17024] dump_stack+0x11d/0x181 [ 512.712333][T17024] should_fail.cold+0xa/0x1a [ 512.716960][T17024] __should_failslab+0xee/0x130 [ 512.722031][T17024] should_failslab+0x9/0x14 [ 512.726791][T17024] kmem_cache_alloc+0x29/0x5d0 [ 512.731622][T17024] ? __write_once_size+0x5a/0xe0 [ 512.736644][T17024] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 512.742573][T17024] __d_alloc+0x52/0x4b0 [ 512.746750][T17024] ? timestamp_truncate+0x11b/0x160 [ 512.752000][T17024] d_alloc_pseudo+0x27/0x70 [ 512.756542][T17024] alloc_file_pseudo+0x96/0x1b0 [ 512.761472][T17024] __shmem_file_setup.part.0+0xd4/0x1f0 [ 512.767043][T17024] shmem_file_setup+0x7b/0xa0 [ 512.771811][T17024] __x64_sys_memfd_create+0x20d/0x370 [ 512.777320][T17024] do_syscall_64+0xcc/0x3a0 [ 512.782009][T17024] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 512.788085][T17024] RIP: 0033:0x45b349 [ 512.792070][T17024] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.812273][T17024] RSP: 002b:00007fb65ee01a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 512.820705][T17024] RAX: ffffffffffffffda RBX: 00007fb65ee026d4 RCX: 000000000045b349 [ 512.828805][T17024] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 512.836792][T17024] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 512.844904][T17024] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 512.853000][T17024] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000002 12:58:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 512.888908][T17036] FAULT_INJECTION: forcing a failure. [ 512.888908][T17036] name failslab, interval 1, probability 0, space 0, times 0 [ 512.930389][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 512.936439][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 512.961718][T17036] CPU: 0 PID: 17036 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 512.970419][T17036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.980721][T17036] Call Trace: [ 512.984025][T17036] dump_stack+0x11d/0x181 [ 512.988480][T17036] should_fail.cold+0xa/0x1a [ 512.993187][T17036] __should_failslab+0xee/0x130 [ 512.998066][T17036] should_failslab+0x9/0x14 [ 513.002603][T17036] kmem_cache_alloc_trace+0x2a/0x5d0 [ 513.007979][T17036] ? __write_once_size.constprop.0+0x12/0x20 [ 513.014020][T17036] memcg_kmem_get_cache+0x230/0x320 [ 513.019567][T17036] kmem_cache_alloc+0x117/0x5d0 [ 513.024547][T17036] ? _kstrtoull+0xfc/0x130 [ 513.028974][T17036] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 513.034700][T17036] ? shmem_destroy_inode+0x70/0x70 [ 513.039931][T17036] shmem_alloc_inode+0x31/0x60 [ 513.044718][T17036] alloc_inode+0x48/0x130 [ 513.049284][T17036] new_inode_pseudo+0x35/0xe0 [ 513.054118][T17036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 513.060419][T17036] new_inode+0x28/0x50 [ 513.064584][T17036] shmem_get_inode+0x85/0x490 [ 513.069343][T17036] ? _raw_spin_unlock+0x4b/0x60 [ 513.074356][T17036] __shmem_file_setup.part.0+0x6f/0x1f0 [ 513.079981][T17036] shmem_file_setup+0x7b/0xa0 [ 513.084676][T17036] __x64_sys_memfd_create+0x20d/0x370 [ 513.090072][T17036] do_syscall_64+0xcc/0x3a0 [ 513.094717][T17036] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 513.100540][T17045] FAULT_INJECTION: forcing a failure. [ 513.100540][T17045] name failslab, interval 1, probability 0, space 0, times 0 [ 513.100670][T17036] RIP: 0033:0x45b349 12:58:16 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:16 executing program 1 (fault-call:1 fault-nth:4): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 513.117364][T17036] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 513.121107][T17043] FAULT_INJECTION: forcing a failure. [ 513.121107][T17043] name failslab, interval 1, probability 0, space 0, times 0 [ 513.136983][T17036] RSP: 002b:00007fb5c8214a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 513.137002][T17036] RAX: ffffffffffffffda RBX: 00007fb5c82156d4 RCX: 000000000045b349 [ 513.137012][T17036] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 12:58:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:16 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 513.137023][T17036] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 513.137033][T17036] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 513.137043][T17036] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000002 [ 513.240418][T17045] CPU: 1 PID: 17045 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 513.249145][T17045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.259210][T17045] Call Trace: [ 513.262514][T17045] dump_stack+0x11d/0x181 [ 513.266910][T17045] should_fail.cold+0xa/0x1a [ 513.271548][T17045] __should_failslab+0xee/0x130 [ 513.276416][T17045] should_failslab+0x9/0x14 [ 513.280951][T17045] kmem_cache_alloc+0x29/0x5d0 [ 513.285742][T17045] ? _kstrtoull+0xfc/0x130 [ 513.290286][T17045] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 513.296134][T17045] ? shmem_destroy_inode+0x70/0x70 [ 513.301466][T17045] shmem_alloc_inode+0x31/0x60 [ 513.306246][T17045] alloc_inode+0x48/0x130 [ 513.310592][T17045] new_inode_pseudo+0x35/0xe0 [ 513.315284][T17045] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 513.316439][T17057] FAULT_INJECTION: forcing a failure. [ 513.316439][T17057] name failslab, interval 1, probability 0, space 0, times 0 [ 513.321666][T17045] new_inode+0x28/0x50 [ 513.321699][T17045] shmem_get_inode+0x85/0x490 [ 513.343252][T17045] ? _raw_spin_unlock+0x4b/0x60 [ 513.348221][T17045] __shmem_file_setup.part.0+0x6f/0x1f0 [ 513.353783][T17045] shmem_file_setup+0x7b/0xa0 [ 513.358560][T17045] __x64_sys_memfd_create+0x20d/0x370 [ 513.363962][T17045] do_syscall_64+0xcc/0x3a0 [ 513.368557][T17045] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 513.374582][T17045] RIP: 0033:0x45b349 [ 513.378498][T17045] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 513.398125][T17045] RSP: 002b:00007efec65d0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 513.406557][T17045] RAX: ffffffffffffffda RBX: 00007efec65d16d4 RCX: 000000000045b349 [ 513.414537][T17045] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 513.422580][T17045] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 513.430610][T17045] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 513.438595][T17045] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000001 [ 513.476691][T17057] CPU: 0 PID: 17057 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 513.485541][T17057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.495736][T17057] Call Trace: [ 513.499058][T17057] dump_stack+0x11d/0x181 [ 513.503411][T17057] should_fail.cold+0xa/0x1a [ 513.508192][T17057] __should_failslab+0xee/0x130 [ 513.513128][T17057] should_failslab+0x9/0x14 [ 513.517657][T17057] kmem_cache_alloc+0x29/0x5d0 [ 513.522464][T17057] ? memcg_kmem_put_cache+0x7c/0xc0 [ 513.527821][T17057] ? kmem_cache_alloc+0x1f3/0x5d0 [ 513.532939][T17057] __alloc_file+0x4d/0x210 [ 513.537368][T17057] alloc_empty_file+0x8f/0x180 [ 513.542145][T17057] alloc_file+0x4e/0x2b0 [ 513.546443][T17057] ? _raw_spin_unlock+0x4b/0x60 [ 513.551316][T17057] alloc_file_pseudo+0x11c/0x1b0 [ 513.556298][T17057] __shmem_file_setup.part.0+0xd4/0x1f0 [ 513.565775][T17057] shmem_file_setup+0x7b/0xa0 [ 513.570496][T17057] __x64_sys_memfd_create+0x20d/0x370 [ 513.575993][T17057] do_syscall_64+0xcc/0x3a0 [ 513.580603][T17057] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 513.586606][T17057] RIP: 0033:0x45b349 [ 513.590711][T17057] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 513.610521][T17057] RSP: 002b:00007fb65ee01a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 513.618945][T17057] RAX: ffffffffffffffda RBX: 00007fb65ee026d4 RCX: 000000000045b349 [ 513.627341][T17057] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 12:58:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:16 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 513.635605][T17057] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 513.643704][T17057] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 513.651794][T17057] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000003 [ 513.661639][T17043] CPU: 1 PID: 17043 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 513.670343][T17043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.680439][T17043] Call Trace: [ 513.683796][T17043] dump_stack+0x11d/0x181 12:58:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 513.688284][T17043] should_fail.cold+0xa/0x1a [ 513.692955][T17043] __should_failslab+0xee/0x130 [ 513.697835][T17043] should_failslab+0x9/0x14 [ 513.702396][T17043] kmem_cache_alloc+0x29/0x5d0 [ 513.707183][T17043] ? kmem_cache_alloc+0x1f3/0x5d0 [ 513.712396][T17043] ? memcg_kmem_put_cache+0x7c/0xc0 [ 513.717614][T17043] security_file_alloc+0x48/0x110 [ 513.722651][T17043] __alloc_file+0xa3/0x210 [ 513.728714][T17043] alloc_empty_file+0x8f/0x180 [ 513.734578][T17043] alloc_file+0x4e/0x2b0 [ 513.738849][T17043] ? _raw_spin_unlock+0x4b/0x60 [ 513.743856][T17043] alloc_file_pseudo+0x11c/0x1b0 [ 513.750146][T17043] __shmem_file_setup.part.0+0xd4/0x1f0 [ 513.755704][T17043] shmem_file_setup+0x7b/0xa0 [ 513.760498][T17043] __x64_sys_memfd_create+0x20d/0x370 [ 513.765988][T17043] do_syscall_64+0xcc/0x3a0 [ 513.770533][T17043] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 513.776434][T17043] RIP: 0033:0x45b349 [ 513.780409][T17043] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 513.800020][T17043] RSP: 002b:00007f16c48e7a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 513.808438][T17043] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 000000000045b349 [ 513.808965][T17071] FAULT_INJECTION: forcing a failure. [ 513.808965][T17071] name failslab, interval 1, probability 0, space 0, times 0 [ 513.816551][T17043] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 12:58:17 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 513.816631][T17043] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 513.816642][T17043] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 513.816664][T17043] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000004 [ 513.861628][T17036] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17036) [ 513.928643][T17071] CPU: 0 PID: 17071 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 513.937355][T17071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.947413][T17071] Call Trace: [ 513.950711][T17071] dump_stack+0x11d/0x181 [ 513.955064][T17071] should_fail.cold+0xa/0x1a [ 513.959748][T17071] __should_failslab+0xee/0x130 [ 513.964607][T17071] should_failslab+0x9/0x14 [ 513.969222][T17071] kmem_cache_alloc+0x29/0x5d0 [ 513.974224][T17071] ? __write_once_size+0x5a/0xe0 [ 513.979232][T17071] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 513.985123][T17071] __d_alloc+0x52/0x4b0 [ 513.989294][T17071] ? timestamp_truncate+0x11b/0x160 [ 513.994630][T17071] d_alloc_pseudo+0x27/0x70 [ 513.999158][T17071] alloc_file_pseudo+0x96/0x1b0 [ 514.004079][T17071] __shmem_file_setup.part.0+0xd4/0x1f0 [ 514.009637][T17071] shmem_file_setup+0x7b/0xa0 [ 514.014354][T17071] __x64_sys_memfd_create+0x20d/0x370 [ 514.019774][T17071] do_syscall_64+0xcc/0x3a0 [ 514.024295][T17071] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 514.030190][T17071] RIP: 0033:0x45b349 [ 514.034088][T17071] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.053800][T17071] RSP: 002b:00007efec65d0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 514.062239][T17071] RAX: ffffffffffffffda RBX: 00007efec65d16d4 RCX: 000000000045b349 [ 514.070223][T17071] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 514.078324][T17071] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 514.086305][T17071] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 514.094294][T17071] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000002 12:58:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:17 executing program 1 (fault-call:1 fault-nth:5): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 514.183303][T17081] FAULT_INJECTION: forcing a failure. [ 514.183303][T17081] name failslab, interval 1, probability 0, space 0, times 0 [ 514.221577][T17036] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 514.223080][T17081] CPU: 0 PID: 17081 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 514.238556][T17081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.248827][T17081] Call Trace: [ 514.252204][T17081] dump_stack+0x11d/0x181 [ 514.256551][T17081] should_fail.cold+0xa/0x1a [ 514.261157][T17081] __should_failslab+0xee/0x130 [ 514.266027][T17081] should_failslab+0x9/0x14 [ 514.270598][T17081] kmem_cache_alloc+0x29/0x5d0 [ 514.275490][T17081] ? kmem_cache_alloc+0x1f3/0x5d0 [ 514.280537][T17081] ? memcg_kmem_put_cache+0x7c/0xc0 [ 514.285782][T17081] security_file_alloc+0x48/0x110 [ 514.290821][T17081] __alloc_file+0xa3/0x210 [ 514.295279][T17081] alloc_empty_file+0x8f/0x180 [ 514.300190][T17081] alloc_file+0x4e/0x2b0 [ 514.304450][T17081] ? _raw_spin_unlock+0x4b/0x60 [ 514.309390][T17081] alloc_file_pseudo+0x11c/0x1b0 [ 514.314379][T17081] __shmem_file_setup.part.0+0xd4/0x1f0 [ 514.319979][T17081] shmem_file_setup+0x7b/0xa0 [ 514.324778][T17081] __x64_sys_memfd_create+0x20d/0x370 [ 514.330245][T17081] do_syscall_64+0xcc/0x3a0 [ 514.334896][T17081] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 514.336826][T17084] FAULT_INJECTION: forcing a failure. [ 514.336826][T17084] name failslab, interval 1, probability 0, space 0, times 0 [ 514.340861][T17081] RIP: 0033:0x45b349 [ 514.340895][T17081] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.377117][T17081] RSP: 002b:00007fb65ee01a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 514.385543][T17081] RAX: ffffffffffffffda RBX: 00007fb65ee026d4 RCX: 000000000045b349 [ 514.393533][T17081] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 514.401516][T17081] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 514.409780][T17081] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 514.417759][T17081] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000004 [ 514.426189][T17084] CPU: 1 PID: 17084 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 514.434894][T17084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.444966][T17084] Call Trace: [ 514.448279][T17084] dump_stack+0x11d/0x181 [ 514.452674][T17084] ? vprintk_func+0x8d/0x140 [ 514.457391][T17084] should_fail.cold+0xa/0x1a [ 514.462017][T17084] __should_failslab+0xee/0x130 [ 514.466994][T17084] should_failslab+0x9/0x14 [ 514.471510][T17084] __kmalloc+0x53/0x690 [ 514.475688][T17084] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 514.481432][T17084] tomoyo_realpath_from_path+0x83/0x4c0 [ 514.486989][T17084] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 514.492377][T17084] tomoyo_path_perm+0x15d/0x390 [ 514.497566][T17084] tomoyo_path_truncate+0x26/0x40 [ 514.502600][T17084] security_path_truncate+0x9b/0xd0 [ 514.507962][T17084] do_sys_ftruncate+0x27d/0x340 [ 514.512852][T17084] __x64_sys_ftruncate+0x3f/0x50 [ 514.517817][T17084] do_syscall_64+0xcc/0x3a0 [ 514.522393][T17084] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 514.528293][T17084] RIP: 0033:0x45b317 [ 514.532192][T17084] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.551904][T17084] RSP: 002b:00007f16c48e7a68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 514.561796][T17084] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 000000000045b317 [ 514.569899][T17084] RDX: 0000000020000058 RSI: 0000000000020000 RDI: 0000000000000004 [ 514.578181][T17084] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 514.586160][T17084] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000003 [ 514.594213][T17084] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000005 [ 514.637433][T17084] ERROR: Out of memory at tomoyo_realpath_from_path. [ 514.650674][T17036] BTRFS error (device loop4): open_ctree failed 12:58:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:18 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:18 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:18 executing program 1 (fault-call:1 fault-nth:6): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 514.807838][T17102] FAULT_INJECTION: forcing a failure. [ 514.807838][T17102] name failslab, interval 1, probability 0, space 0, times 0 [ 514.829270][T17104] FAULT_INJECTION: forcing a failure. [ 514.829270][T17104] name failslab, interval 1, probability 0, space 0, times 0 [ 514.854636][T17102] CPU: 1 PID: 17102 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 514.863383][T17102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.873447][T17102] Call Trace: [ 514.876813][T17102] dump_stack+0x11d/0x181 [ 514.881158][T17102] should_fail.cold+0xa/0x1a [ 514.885769][T17102] __should_failslab+0xee/0x130 [ 514.890657][T17102] should_failslab+0x9/0x14 [ 514.895182][T17102] __kmalloc+0x53/0x690 [ 514.899368][T17102] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 514.905177][T17102] tomoyo_realpath_from_path+0x83/0x4c0 [ 514.910732][T17102] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 514.916193][T17102] tomoyo_path_perm+0x15d/0x390 [ 514.921207][T17102] tomoyo_path_truncate+0x26/0x40 [ 514.926288][T17102] security_path_truncate+0x9b/0xd0 [ 514.931532][T17102] do_sys_ftruncate+0x27d/0x340 [ 514.936486][T17102] __x64_sys_ftruncate+0x3f/0x50 [ 514.941448][T17102] do_syscall_64+0xcc/0x3a0 [ 514.946032][T17102] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 514.951934][T17102] RIP: 0033:0x45b317 [ 514.956023][T17102] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.975643][T17102] RSP: 002b:00007fb65ee01a68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 514.984193][T17102] RAX: ffffffffffffffda RBX: 00007fb65ee026d4 RCX: 000000000045b317 [ 514.992176][T17102] RDX: 0000000020000058 RSI: 0000000000020000 RDI: 0000000000000004 [ 515.000199][T17102] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 515.008191][T17102] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000003 [ 515.016177][T17102] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000005 [ 515.026762][T17110] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17110) [ 515.052859][T17110] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 515.058880][T17104] CPU: 1 PID: 17104 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 515.064609][T17102] ERROR: Out of memory at tomoyo_realpath_from_path. [ 515.069733][T17104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.069739][T17104] Call Trace: [ 515.069779][T17104] dump_stack+0x11d/0x181 [ 515.094258][T17104] should_fail.cold+0xa/0x1a [ 515.098975][T17104] __should_failslab+0xee/0x130 [ 515.104083][T17104] should_failslab+0x9/0x14 [ 515.108631][T17104] kmem_cache_alloc+0x29/0x5d0 [ 515.113637][T17104] ? memcg_kmem_put_cache+0x7c/0xc0 [ 515.119034][T17104] ? kmem_cache_alloc+0x1f3/0x5d0 [ 515.124259][T17104] __alloc_file+0x4d/0x210 [ 515.128783][T17104] alloc_empty_file+0x8f/0x180 [ 515.133650][T17104] alloc_file+0x4e/0x2b0 [ 515.138005][T17104] ? _raw_spin_unlock+0x4b/0x60 [ 515.142871][T17104] alloc_file_pseudo+0x11c/0x1b0 [ 515.147844][T17104] __shmem_file_setup.part.0+0xd4/0x1f0 [ 515.153538][T17104] shmem_file_setup+0x7b/0xa0 [ 515.158311][T17104] __x64_sys_memfd_create+0x20d/0x370 [ 515.163939][T17104] do_syscall_64+0xcc/0x3a0 [ 515.168529][T17104] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 515.174433][T17104] RIP: 0033:0x45b349 [ 515.178408][T17104] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.198076][T17104] RSP: 002b:00007efec65d0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 12:58:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {0x0}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 515.207033][T17104] RAX: ffffffffffffffda RBX: 00007efec65d16d4 RCX: 000000000045b349 [ 515.215157][T17104] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 515.223136][T17104] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 515.231113][T17104] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 515.239262][T17104] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000003 12:58:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 515.289651][T17124] FAULT_INJECTION: forcing a failure. [ 515.289651][T17124] name failslab, interval 1, probability 0, space 0, times 0 [ 515.310764][T17110] BTRFS error (device loop4): open_ctree failed [ 515.317472][T17102] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17102) [ 515.343904][T17124] CPU: 1 PID: 17124 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 515.352673][T17124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.362732][T17124] Call Trace: [ 515.366044][T17124] dump_stack+0x11d/0x181 [ 515.370406][T17124] should_fail.cold+0xa/0x1a [ 515.375026][T17124] __should_failslab+0xee/0x130 [ 515.380079][T17124] should_failslab+0x9/0x14 [ 515.384599][T17124] __kmalloc+0x53/0x690 [ 515.388855][T17124] ? memcg_kmem_put_cache+0x7c/0xc0 [ 515.394063][T17124] ? debug_smp_processor_id+0x43/0x137 [ 515.399606][T17124] ? tomoyo_encode2.part.0+0xd9/0x260 [ 515.405105][T17124] tomoyo_encode2.part.0+0xd9/0x260 [ 515.410474][T17124] ? dynamic_dname+0x150/0x150 [ 515.416605][T17124] tomoyo_encode+0x34/0x50 [ 515.421054][T17124] tomoyo_realpath_from_path+0x14a/0x4c0 [ 515.426877][T17124] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 515.432281][T17124] tomoyo_path_perm+0x15d/0x390 [ 515.437381][T17124] tomoyo_path_truncate+0x26/0x40 12:58:18 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 515.442419][T17124] security_path_truncate+0x9b/0xd0 [ 515.447852][T17124] do_sys_ftruncate+0x27d/0x340 [ 515.452826][T17124] __x64_sys_ftruncate+0x3f/0x50 [ 515.457808][T17124] do_syscall_64+0xcc/0x3a0 [ 515.462355][T17124] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 515.468440][T17124] RIP: 0033:0x45b317 [ 515.472413][T17124] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.492066][T17124] RSP: 002b:00007f16c48e7a68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 515.500672][T17124] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 000000000045b317 [ 515.508679][T17124] RDX: 0000000020000058 RSI: 0000000000020000 RDI: 0000000000000004 [ 515.516663][T17124] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 515.524701][T17124] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000003 [ 515.533012][T17124] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000006 [ 515.567654][T17135] FAULT_INJECTION: forcing a failure. [ 515.567654][T17135] name failslab, interval 1, probability 0, space 0, times 0 [ 515.580401][T17135] CPU: 1 PID: 17135 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 515.589316][T17135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.599397][T17135] Call Trace: [ 515.602707][T17135] dump_stack+0x11d/0x181 [ 515.607099][T17135] should_fail.cold+0xa/0x1a [ 515.611722][T17135] __should_failslab+0xee/0x130 [ 515.616633][T17135] should_failslab+0x9/0x14 [ 515.621204][T17135] kmem_cache_alloc+0x29/0x5d0 [ 515.626054][T17135] ? kmem_cache_alloc+0x1f3/0x5d0 [ 515.631076][T17135] ? memcg_kmem_put_cache+0x7c/0xc0 [ 515.636305][T17135] security_file_alloc+0x48/0x110 [ 515.641322][T17135] __alloc_file+0xa3/0x210 [ 515.645748][T17135] alloc_empty_file+0x8f/0x180 [ 515.650510][T17135] alloc_file+0x4e/0x2b0 [ 515.654777][T17135] ? _raw_spin_unlock+0x4b/0x60 [ 515.659636][T17135] alloc_file_pseudo+0x11c/0x1b0 [ 515.666585][T17135] __shmem_file_setup.part.0+0xd4/0x1f0 [ 515.672143][T17135] shmem_file_setup+0x7b/0xa0 [ 515.676833][T17135] __x64_sys_memfd_create+0x20d/0x370 [ 515.682268][T17135] do_syscall_64+0xcc/0x3a0 [ 515.686901][T17135] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 515.692879][T17135] RIP: 0033:0x45b349 [ 515.696856][T17135] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.717956][T17135] RSP: 002b:00007efec65d0a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 515.727504][T17135] RAX: ffffffffffffffda RBX: 00007efec65d16d4 RCX: 000000000045b349 [ 515.735576][T17135] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 515.743645][T17135] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 515.751704][T17135] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000003 [ 515.759691][T17135] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000004 12:58:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {0x0}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 515.800366][T17124] ERROR: Out of memory at tomoyo_realpath_from_path. 12:58:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:19 executing program 1 (fault-call:1 fault-nth:7): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:19 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 516.074561][T17152] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17152) 12:58:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 516.237395][T17161] FAULT_INJECTION: forcing a failure. [ 516.237395][T17161] name failslab, interval 1, probability 0, space 0, times 0 [ 516.260441][T17161] CPU: 1 PID: 17161 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 516.269221][T17161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.279410][T17161] Call Trace: [ 516.282804][T17161] dump_stack+0x11d/0x181 [ 516.287250][T17161] should_fail.cold+0xa/0x1a [ 516.291864][T17161] __should_failslab+0xee/0x130 [ 516.297180][T17161] should_failslab+0x9/0x14 [ 516.301793][T17161] __kmalloc+0x53/0x690 [ 516.305971][T17161] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 516.311837][T17161] tomoyo_realpath_from_path+0x83/0x4c0 [ 516.317389][T17161] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 516.322785][T17161] tomoyo_path_perm+0x15d/0x390 [ 516.327895][T17161] tomoyo_path_truncate+0x26/0x40 [ 516.333038][T17161] security_path_truncate+0x9b/0xd0 [ 516.338254][T17161] do_sys_ftruncate+0x27d/0x340 [ 516.343184][T17161] __x64_sys_ftruncate+0x3f/0x50 [ 516.348178][T17161] do_syscall_64+0xcc/0x3a0 [ 516.352697][T17161] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 516.358684][T17161] RIP: 0033:0x45b317 [ 516.362954][T17161] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.382729][T17161] RSP: 002b:00007efec65d0a68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 516.391274][T17161] RAX: ffffffffffffffda RBX: 00007efec65d16d4 RCX: 000000000045b317 [ 516.399361][T17161] RDX: 0000000020000058 RSI: 0000000000020000 RDI: 0000000000000004 [ 516.407335][T17161] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 516.415314][T17161] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000003 [ 516.424695][T17161] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000005 12:58:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 516.477668][T17161] ERROR: Out of memory at tomoyo_realpath_from_path. [ 516.493309][T17172] FAULT_INJECTION: forcing a failure. [ 516.493309][T17172] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 516.518008][T17172] CPU: 0 PID: 17172 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 12:58:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {0x0}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 516.526777][T17172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.536857][T17172] Call Trace: [ 516.540822][T17172] dump_stack+0x11d/0x181 [ 516.545174][T17172] should_fail.cold+0xa/0x1a [ 516.549780][T17172] should_fail_alloc_page+0x50/0x60 [ 516.555046][T17172] __alloc_pages_nodemask+0xd2/0x310 [ 516.560353][T17172] alloc_pages_vma+0xc1/0x3a0 [ 516.565238][T17172] shmem_alloc_page+0x67/0xf0 [ 516.569923][T17172] shmem_alloc_and_acct_page+0x125/0x450 [ 516.575540][T17172] shmem_getpage_gfp+0x2f2/0x1390 [ 516.580623][T17172] ? shmem_xattr_handler_set+0x70/0x70 [ 516.586097][T17172] shmem_write_begin+0x9f/0x140 [ 516.590975][T17172] generic_perform_write+0x136/0x320 [ 516.596302][T17172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.602652][T17172] __generic_file_write_iter+0x251/0x380 [ 516.608347][T17172] ? generic_write_check_limits.isra.0+0x168/0x1c0 [ 516.614936][T17172] generic_file_write_iter+0x28c/0x38c [ 516.620397][T17172] new_sync_write+0x388/0x4a0 [ 516.625215][T17172] __vfs_write+0xb1/0xc0 [ 516.629639][T17172] vfs_write+0x18a/0x390 [ 516.633947][T17172] ksys_pwrite64+0xee/0x120 [ 516.638441][T17172] __x64_sys_pwrite64+0x5e/0x80 [ 516.643401][T17172] do_syscall_64+0xcc/0x3a0 [ 516.647941][T17172] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 516.653839][T17172] RIP: 0033:0x415147 [ 516.657757][T17172] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 12:58:20 executing program 1 (fault-call:1 fault-nth:8): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 516.677452][T17172] RSP: 002b:00007f16c48e7a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 516.685919][T17172] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 0000000000415147 [ 516.693874][T17172] RDX: 000000000000004c RSI: 00000000200002c0 RDI: 0000000000000004 [ 516.701897][T17172] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 516.710061][T17172] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000003 [ 516.718068][T17172] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000007 [ 516.771046][T17160] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17160) [ 516.816676][T17160] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 516.850900][T17180] FAULT_INJECTION: forcing a failure. [ 516.850900][T17180] name failslab, interval 1, probability 0, space 0, times 0 [ 516.863634][T17180] CPU: 1 PID: 17180 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 516.872383][T17180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.882437][T17180] Call Trace: [ 516.885738][T17180] dump_stack+0x11d/0x181 [ 516.890173][T17180] should_fail.cold+0xa/0x1a [ 516.894777][T17180] __should_failslab+0xee/0x130 [ 516.899736][T17180] should_failslab+0x9/0x14 [ 516.906392][T17180] kmem_cache_alloc+0x29/0x5d0 [ 516.911178][T17180] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 516.917431][T17180] ? __rcu_read_unlock+0x66/0x3d0 [ 516.922471][T17180] xas_alloc+0x208/0x240 [ 516.926757][T17180] xas_create+0x44e/0x920 [ 516.931099][T17180] xas_create_range+0x129/0x300 [ 516.935983][T17180] shmem_add_to_page_cache+0x2f0/0x6b0 [ 516.941936][T17180] shmem_getpage_gfp+0x3fd/0x1390 [ 516.946982][T17180] shmem_write_begin+0x9f/0x140 [ 516.951951][T17180] generic_perform_write+0x136/0x320 [ 516.957276][T17180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.963607][T17180] __generic_file_write_iter+0x251/0x380 [ 516.969255][T17180] ? generic_write_check_limits.isra.0+0x168/0x1c0 [ 516.975774][T17180] generic_file_write_iter+0x28c/0x38c [ 516.981674][T17180] new_sync_write+0x388/0x4a0 [ 516.986449][T17180] __vfs_write+0xb1/0xc0 [ 516.990809][T17180] vfs_write+0x18a/0x390 [ 516.995183][T17180] ksys_pwrite64+0xee/0x120 [ 516.999705][T17180] __x64_sys_pwrite64+0x5e/0x80 [ 517.004604][T17180] do_syscall_64+0xcc/0x3a0 [ 517.009234][T17180] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 517.015238][T17180] RIP: 0033:0x415147 [ 517.019202][T17180] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 517.038807][T17180] RSP: 002b:00007f16c48e7a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 517.047237][T17180] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 0000000000415147 [ 517.055278][T17180] RDX: 000000000000004c RSI: 00000000200002c0 RDI: 0000000000000004 12:58:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 517.063254][T17180] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 517.071229][T17180] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000003 [ 517.079434][T17180] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000008 [ 517.090391][ C0] net_ratelimit: 22 callbacks suppressed [ 517.090400][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 517.101960][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:58:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 517.120510][T17160] BTRFS error (device loop4): open_ctree failed 12:58:20 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:20 executing program 1 (fault-call:1 fault-nth:9): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 517.357237][T17197] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17197) [ 517.483881][T17212] FAULT_INJECTION: forcing a failure. [ 517.483881][T17212] name failslab, interval 1, probability 0, space 0, times 0 [ 517.505362][T17197] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17197) [ 517.514045][T17212] CPU: 0 PID: 17212 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 517.528998][T17212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.539067][T17212] Call Trace: [ 517.542389][T17212] dump_stack+0x11d/0x181 [ 517.546745][T17212] should_fail.cold+0xa/0x1a [ 517.551427][T17212] __should_failslab+0xee/0x130 [ 517.556288][T17212] should_failslab+0x9/0x14 [ 517.560911][T17212] __kmalloc+0x53/0x690 [ 517.565152][T17212] ? memcg_kmem_put_cache+0x7c/0xc0 [ 517.570356][T17212] ? debug_smp_processor_id+0x43/0x137 [ 517.575947][T17212] ? tomoyo_encode2.part.0+0xd9/0x260 [ 517.581326][T17212] tomoyo_encode2.part.0+0xd9/0x260 [ 517.586528][T17212] ? dynamic_dname+0x150/0x150 [ 517.591297][T17212] tomoyo_encode+0x34/0x50 [ 517.595782][T17212] tomoyo_realpath_from_path+0x14a/0x4c0 [ 517.601500][T17212] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 517.607024][T17212] tomoyo_path_perm+0x15d/0x390 [ 517.612080][T17212] tomoyo_path_truncate+0x26/0x40 [ 517.617165][T17212] security_path_truncate+0x9b/0xd0 [ 517.622525][T17212] do_sys_ftruncate+0x27d/0x340 [ 517.627387][T17212] __x64_sys_ftruncate+0x3f/0x50 [ 517.632327][T17212] do_syscall_64+0xcc/0x3a0 [ 517.636964][T17212] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 517.642870][T17212] RIP: 0033:0x45b317 [ 517.646790][T17212] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.666412][T17212] RSP: 002b:00007efec65d0a68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 517.674854][T17212] RAX: ffffffffffffffda RBX: 00007efec65d16d4 RCX: 000000000045b317 [ 517.682844][T17212] RDX: 0000000020000058 RSI: 0000000000020000 RDI: 0000000000000004 [ 517.691055][T17212] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 517.699032][T17212] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000003 [ 517.707113][T17212] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000006 [ 517.810376][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 517.816191][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 517.828686][T17216] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17216) [ 517.873152][T17222] FAULT_INJECTION: forcing a failure. [ 517.873152][T17222] name failslab, interval 1, probability 0, space 0, times 0 [ 517.883940][T17212] ERROR: Out of memory at tomoyo_realpath_from_path. [ 517.930728][T17222] CPU: 1 PID: 17222 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 517.939505][T17222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.949763][T17222] Call Trace: [ 517.953066][T17222] dump_stack+0x11d/0x181 [ 517.957605][T17222] should_fail.cold+0xa/0x1a [ 517.962229][T17222] __should_failslab+0xee/0x130 [ 517.967097][T17222] should_failslab+0x9/0x14 [ 517.971729][T17222] kmem_cache_alloc+0x29/0x5d0 12:58:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 517.976534][T17222] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 517.982577][T17222] getname_flags+0x91/0x380 [ 517.987101][T17222] ? __sb_end_write+0xbe/0x100 [ 517.991951][T17222] getname+0x23/0x40 [ 517.995871][T17222] do_sys_open+0x27f/0x4f0 [ 518.000410][T17222] __x64_sys_open+0x55/0x70 [ 518.005047][T17222] do_syscall_64+0xcc/0x3a0 [ 518.009574][T17222] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 518.015494][T17222] RIP: 0033:0x4150e1 [ 518.019523][T17222] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 518.039255][T17222] RSP: 002b:00007f16c48e7a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 518.047679][T17222] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 00000000004150e1 [ 518.055765][T17222] RDX: 00007f16c48e7b0a RSI: 0000000000000002 RDI: 00007f16c48e7b00 [ 518.063748][T17222] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 518.071763][T17222] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 518.080005][T17222] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000009 12:58:21 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 518.180751][T17216] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 518.233383][T17241] FAULT_INJECTION: forcing a failure. [ 518.233383][T17241] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 518.250547][T17216] BTRFS error (device loop4): open_ctree failed [ 518.275986][T17241] CPU: 1 PID: 17241 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 518.284869][T17241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.295033][T17241] Call Trace: [ 518.298463][T17241] dump_stack+0x11d/0x181 [ 518.302823][T17241] should_fail.cold+0xa/0x1a [ 518.307448][T17241] should_fail_alloc_page+0x50/0x60 [ 518.312755][T17241] __alloc_pages_nodemask+0xd2/0x310 [ 518.318226][T17241] alloc_pages_vma+0xc1/0x3a0 12:58:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 518.322920][T17241] shmem_alloc_page+0x67/0xf0 [ 518.327677][T17241] shmem_alloc_and_acct_page+0x125/0x450 [ 518.333330][T17241] shmem_getpage_gfp+0x2f2/0x1390 [ 518.338383][T17241] ? shmem_xattr_handler_set+0x70/0x70 [ 518.343855][T17241] shmem_write_begin+0x9f/0x140 [ 518.348808][T17241] generic_perform_write+0x136/0x320 [ 518.354196][T17241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.360578][T17241] __generic_file_write_iter+0x251/0x380 [ 518.366444][T17241] ? generic_write_check_limits.isra.0+0x168/0x1c0 [ 518.373088][T17241] generic_file_write_iter+0x28c/0x38c [ 518.373186][T17245] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17245) [ 518.393035][T17241] new_sync_write+0x388/0x4a0 [ 518.397773][T17241] __vfs_write+0xb1/0xc0 [ 518.402029][T17241] vfs_write+0x18a/0x390 [ 518.406284][T17241] ksys_pwrite64+0xee/0x120 [ 518.410935][T17241] __x64_sys_pwrite64+0x5e/0x80 [ 518.415861][T17241] do_syscall_64+0xcc/0x3a0 [ 518.420391][T17241] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 518.426377][T17241] RIP: 0033:0x415147 [ 518.430287][T17241] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 518.450564][T17241] RSP: 002b:00007efec65d0a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 518.459092][T17241] RAX: ffffffffffffffda RBX: 00007efec65d16d4 RCX: 0000000000415147 [ 518.467214][T17241] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000004 12:58:21 executing program 1 (fault-call:1 fault-nth:10): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 518.475433][T17241] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 518.483653][T17241] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000003 [ 518.491630][T17241] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 0000000000000007 [ 518.499771][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 518.505579][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:58:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 518.622569][T17224] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17224) [ 518.713072][T17224] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 518.733514][T17262] FAULT_INJECTION: forcing a failure. [ 518.733514][T17262] name failslab, interval 1, probability 0, space 0, times 0 [ 518.770372][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 518.776183][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 518.782099][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 518.787858][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 518.794075][T17262] CPU: 1 PID: 17262 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 518.802784][T17262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.812838][T17262] Call Trace: [ 518.816185][T17262] dump_stack+0x11d/0x181 [ 518.820527][T17262] should_fail.cold+0xa/0x1a [ 518.825247][T17262] __should_failslab+0xee/0x130 [ 518.830187][T17262] should_failslab+0x9/0x14 [ 518.834690][T17262] kmem_cache_alloc+0x29/0x5d0 [ 518.839833][T17262] ? __read_once_size+0x41/0xe0 [ 518.844701][T17262] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 518.850427][T17262] ? iov_iter_advance+0x216/0x940 [ 518.856066][T17262] ? shmem_write_end+0x2d9/0x4f0 [ 518.861111][T17262] __alloc_file+0x4d/0x210 [ 518.865527][T17262] alloc_empty_file+0x8f/0x180 [ 518.870416][T17262] path_openat+0x74/0x3580 [ 518.874855][T17262] ? __generic_file_write_iter+0x113/0x380 [ 518.880752][T17262] ? generic_write_check_limits.isra.0+0x168/0x1c0 [ 518.887292][T17262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.893545][T17262] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 518.900023][T17262] ? __read_once_size+0x41/0xe0 [ 518.904927][T17262] do_filp_open+0x11e/0x1b0 [ 518.909447][T17262] ? __check_object_size+0x5f/0x346 [ 518.914650][T17262] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 518.920562][T17262] ? __alloc_fd+0x2ef/0x3b0 [ 518.925170][T17262] do_sys_open+0x3b3/0x4f0 [ 518.929607][T17262] __x64_sys_open+0x55/0x70 [ 518.934752][T17262] do_syscall_64+0xcc/0x3a0 [ 518.939300][T17262] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 518.945199][T17262] RIP: 0033:0x4150e1 [ 518.949809][T17262] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 518.969424][T17262] RSP: 002b:00007f16c48e7a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 518.978034][T17262] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 00000000004150e1 [ 518.986274][T17262] RDX: 00007f16c48e7b0a RSI: 0000000000000002 RDI: 00007f16c48e7b00 [ 518.994327][T17262] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 519.002455][T17262] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 519.010966][T17262] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 000000000000000a 12:58:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 519.025378][T17245] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17245) 12:58:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 519.320567][T17224] BTRFS error (device loop4): open_ctree failed 12:58:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:22 executing program 1 (fault-call:1 fault-nth:11): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 519.559063][T17292] FAULT_INJECTION: forcing a failure. [ 519.559063][T17292] name failslab, interval 1, probability 0, space 0, times 0 [ 519.602935][T17292] CPU: 1 PID: 17292 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 519.611639][T17292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.622752][T17292] Call Trace: [ 519.626068][T17292] dump_stack+0x11d/0x181 [ 519.630502][T17292] should_fail.cold+0xa/0x1a [ 519.635319][T17292] __should_failslab+0xee/0x130 [ 519.640186][T17292] should_failslab+0x9/0x14 [ 519.644778][T17292] kmem_cache_alloc+0x29/0x5d0 [ 519.649566][T17292] ? kmem_cache_alloc+0x1f3/0x5d0 [ 519.654713][T17292] ? __read_once_size+0x41/0xe0 [ 519.659625][T17292] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 519.665448][T17292] security_file_alloc+0x48/0x110 [ 519.670513][T17292] __alloc_file+0xa3/0x210 [ 519.674962][T17292] alloc_empty_file+0x8f/0x180 [ 519.679921][T17292] path_openat+0x74/0x3580 [ 519.684358][T17292] ? __generic_file_write_iter+0x113/0x380 [ 519.690425][T17292] ? generic_write_check_limits.isra.0+0x168/0x1c0 [ 519.696959][T17292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.703246][T17292] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 519.709269][T17292] ? __read_once_size+0x41/0xe0 [ 519.714205][T17292] do_filp_open+0x11e/0x1b0 [ 519.718741][T17292] ? __check_object_size+0x5f/0x346 [ 519.725716][T17292] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 519.731907][T17292] ? __alloc_fd+0x2ef/0x3b0 [ 519.736550][T17292] do_sys_open+0x3b3/0x4f0 [ 519.740987][T17292] __x64_sys_open+0x55/0x70 [ 519.745921][T17292] do_syscall_64+0xcc/0x3a0 12:58:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 519.750443][T17292] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 519.756427][T17292] RIP: 0033:0x4150e1 [ 519.760367][T17292] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 519.780477][T17292] RSP: 002b:00007f16c48e7a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 519.788900][T17292] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 00000000004150e1 [ 519.796874][T17292] RDX: 00007f16c48e7b0a RSI: 0000000000000002 RDI: 00007f16c48e7b00 [ 519.804850][T17292] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 519.813161][T17292] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 519.821150][T17292] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 000000000000000b 12:58:23 executing program 1 (fault-call:1 fault-nth:12): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 519.901917][T17290] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17290) 12:58:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 520.154196][T17325] FAULT_INJECTION: forcing a failure. [ 520.154196][T17325] name failslab, interval 1, probability 0, space 0, times 0 [ 520.156585][T17298] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17298) [ 520.181226][T17325] CPU: 1 PID: 17325 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 520.190272][T17325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.200330][T17325] Call Trace: [ 520.203634][T17325] dump_stack+0x11d/0x181 [ 520.208020][T17325] should_fail.cold+0xa/0x1a [ 520.212728][T17325] __should_failslab+0xee/0x130 [ 520.217613][T17325] should_failslab+0x9/0x14 [ 520.222229][T17325] kmem_cache_alloc+0x29/0x5d0 [ 520.227151][T17325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.233828][T17325] ? __follow_mount_rcu.isra.0+0x220/0x310 [ 520.239663][T17325] __d_alloc+0x52/0x4b0 [ 520.243837][T17325] ? __read_once_size+0x5a/0xe0 [ 520.248697][T17325] d_alloc+0x49/0x170 12:58:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 520.252746][T17325] ? __read_once_size+0x5a/0xe0 [ 520.257702][T17325] d_alloc_parallel+0x84/0xe00 [ 520.262698][T17325] ? __d_lookup+0x2b0/0x3f0 [ 520.267323][T17325] ? __read_once_size+0x5a/0xe0 [ 520.272541][T17325] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 520.278411][T17325] ? d_lookup+0xf8/0x120 [ 520.282826][T17325] path_openat+0x1cef/0x3580 [ 520.287497][T17325] ? __generic_file_write_iter+0xe1/0x380 [ 520.293396][T17325] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 520.299609][T17325] do_filp_open+0x11e/0x1b0 [ 520.304159][T17325] ? __alloc_fd+0x2ef/0x3b0 [ 520.308697][T17325] do_sys_open+0x3b3/0x4f0 [ 520.313119][T17325] __x64_sys_open+0x55/0x70 [ 520.317730][T17325] do_syscall_64+0xcc/0x3a0 [ 520.322346][T17325] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 520.328385][T17325] RIP: 0033:0x4150e1 [ 520.332386][T17325] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 520.352086][T17325] RSP: 002b:00007f16c48e7a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 520.360502][T17325] RAX: ffffffffffffffda RBX: 00007f16c48e86d4 RCX: 00000000004150e1 [ 520.368477][T17325] RDX: 00007f16c48e7b0a RSI: 0000000000000002 RDI: 00007f16c48e7b00 [ 520.376471][T17325] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 520.384454][T17325] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 520.392422][T17325] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 000000000000000c [ 520.414679][T17298] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 520.460410][T17298] BTRFS error (device loop4): open_ctree failed 12:58:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:23 executing program 1 (fault-call:1 fault-nth:13): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 520.721729][T17346] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (17346) 12:58:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 521.025911][T17355] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17355) 12:58:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 521.224385][T17372] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17372) [ 521.297633][T17355] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17355) [ 521.310763][T17372] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 521.500650][T17372] BTRFS error (device loop4): open_ctree failed [ 521.705599][T17372] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17372) [ 521.810412][T17372] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 521.860831][T17372] BTRFS error (device loop4): open_ctree failed 12:58:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 521.993639][T17421] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (17421) 12:58:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 522.128317][T17425] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17425) 12:58:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 522.443087][T17445] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17445) 12:58:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 522.610425][ C1] net_ratelimit: 18 callbacks suppressed [ 522.610434][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 522.617004][T17425] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17425) [ 522.622272][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 522.643776][T17445] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 522.930423][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 522.936254][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 522.942112][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 522.947847][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 522.953618][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 522.959433][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 523.064184][T17445] BTRFS error (device loop4): open_ctree failed 12:58:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 523.330434][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 523.336233][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:58:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 523.404458][T17488] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17488) [ 523.520634][T17489] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop3 new:/dev/loop2 12:58:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:27 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x80040, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 523.673594][T17501] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17501) 12:58:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:27 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 523.799605][T17501] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 523.980600][T17488] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17488) [ 524.090715][T17501] BTRFS error (device loop4): open_ctree failed [ 524.181068][T17501] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17501) [ 524.197541][T17501] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 524.240430][T17501] BTRFS error (device loop4): open_ctree failed 12:58:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:27 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:27 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 524.531179][T17549] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17549) 12:58:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:28 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 524.658702][T17550] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop3 new:/dev/loop2 [ 524.736274][T17562] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17562) 12:58:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:28 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 524.837927][T17562] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 525.034122][T17562] BTRFS error (device loop4): open_ctree failed [ 525.050518][T17549] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17549) [ 525.327454][T17562] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17562) [ 525.393604][T17562] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:29 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 525.610462][T17562] BTRFS error (device loop4): open_ctree failed [ 525.617394][T17598] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (17598) [ 525.644724][T17598] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:29 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 525.790402][T17598] BTRFS error (device loop4): open_ctree failed [ 525.816167][T17617] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17617) 12:58:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:29 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:29 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000800, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 526.130629][T17633] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17633) 12:58:29 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 526.302986][T17633] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 526.420462][T17633] BTRFS error (device loop4): open_ctree failed [ 526.426992][T17643] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (17643) [ 526.606485][T17633] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17633) [ 526.768776][T17633] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:30 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 526.880435][T17633] BTRFS error (device loop4): open_ctree failed 12:58:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:30 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 527.083419][T17676] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (17676) 12:58:30 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 527.330543][T17677] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17677) [ 527.461160][T17699] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17699) [ 527.520638][T17699] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 527.529291][T17677] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17677) [ 527.830384][T17699] BTRFS error (device loop4): open_ctree failed [ 527.945510][T17699] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17699) [ 527.978736][T17699] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:31 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 528.040465][T17699] BTRFS error (device loop4): open_ctree failed 12:58:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 528.210387][ C0] net_ratelimit: 24 callbacks suppressed [ 528.210396][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 528.221834][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 528.236501][T17743] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17743) 12:58:31 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 528.352895][T17759] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17759) [ 528.385344][T17759] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 528.540547][T17759] BTRFS error (device loop4): open_ctree failed [ 528.547895][T17743] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17743) 12:58:31 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 528.850417][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 528.856246][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:58:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 529.146750][T17802] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17802) [ 529.170393][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 529.176187][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 529.182084][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 529.187831][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 529.193611][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 529.199416][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 529.309065][T17825] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17825) [ 529.354863][T17802] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17802) [ 529.369629][T17825] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 529.790576][T17825] BTRFS error (device loop4): open_ctree failed [ 530.054201][T17825] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17825) [ 530.083863][T17825] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:33 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 530.134460][T17825] BTRFS error (device loop4): open_ctree failed 12:58:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 530.314015][T17884] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (17884) 12:58:33 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 530.504406][T17883] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17883) 12:58:33 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 530.842660][T17910] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17910) [ 530.935478][T17910] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 530.943739][T17883] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17883) [ 531.140435][T17910] BTRFS error (device loop4): open_ctree failed [ 531.245506][T17910] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17910) [ 531.279707][T17910] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:34 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000080000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 531.320426][T17910] BTRFS error (device loop4): open_ctree failed 12:58:34 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 531.424316][T17945] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17945) 12:58:34 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 531.560264][T17953] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop3 new:/dev/loop2 12:58:35 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 531.681871][T17966] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17966) 12:58:35 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 531.825413][T17966] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:35 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 531.870947][T17945] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (17945) [ 532.023958][T17966] BTRFS error (device loop4): open_ctree failed [ 532.193096][T17966] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (17966) [ 532.241974][T17966] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xde, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:35 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 532.310438][T17966] BTRFS error (device loop4): open_ctree failed 12:58:35 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 532.401721][T18009] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18009) 12:58:35 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:35 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {0x0}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:36 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 532.670196][T18009] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18009) 12:58:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 532.834390][T18026] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18026) [ 532.927166][T18026] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 533.040600][T18026] BTRFS error (device loop4): open_ctree failed [ 533.246640][T18026] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18026) [ 533.286119][T18026] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 533.330736][T18026] BTRFS error (device loop4): open_ctree failed [ 533.340420][ C1] net_ratelimit: 18 callbacks suppressed [ 533.340429][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 533.352057][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 533.357822][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 533.363910][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 533.369808][ C1] protocol 88fb is buggy, dev hsr_slave_0 12:58:36 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {0x0}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 533.375617][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:58:36 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1cf54e, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 533.488202][T18071] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (18071) 12:58:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {0x0}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 533.703374][T18073] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18073) [ 533.730411][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 533.736264][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 533.873591][T18081] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18081) 12:58:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 534.008629][T18081] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:37 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 534.300431][T18081] BTRFS error (device loop4): open_ctree failed [ 534.329547][T18073] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18073) [ 534.450539][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 534.456488][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:58:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:37 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:37 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:38 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {0x0}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 535.140663][T18154] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18154) 12:58:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:38 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 535.391135][T18168] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18168) [ 535.492091][T18168] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 535.500329][T18154] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18154) 12:58:38 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:38 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4365cc0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {0x0}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0e00200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 535.740398][T18168] BTRFS error (device loop4): open_ctree failed 12:58:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0edb301000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 536.066172][T18215] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18215) 12:58:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}], 0x2, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 536.241216][T18230] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18230) [ 536.278328][T18230] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 536.294454][T18215] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18215) 12:58:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0202000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}], 0x2, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {0x0}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 536.460553][T18230] BTRFS error (device loop4): open_ctree failed 12:58:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0203000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0204000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0205000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 536.890468][T18266] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18266) 12:58:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0206000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:40 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}], 0x2, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0207000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 537.241477][T18278] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18278) 12:58:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200030000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 537.306688][T18266] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18266) [ 537.326674][T18278] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200050000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x148, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 537.504709][T18278] BTRFS error (device loop4): open_ctree failed [ 537.693032][T18278] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18278) [ 537.885570][T18278] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 537.905316][T18328] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18328) [ 537.991431][T18278] BTRFS error (device loop4): open_ctree failed 12:58:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:41 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200060000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 538.105149][T18328] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18328) 12:58:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:41 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200070000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 538.335761][T18360] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18360) 12:58:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 538.506762][T18367] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18367) [ 538.522037][T18360] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 538.610397][ C0] net_ratelimit: 22 callbacks suppressed [ 538.610408][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 538.621999][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:58:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02003f0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 538.750392][T18360] BTRFS error (device loop4): open_ctree failed [ 538.757162][T18367] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18367) 12:58:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000200000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 539.034638][T18360] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18360) [ 539.144210][T18360] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 539.250438][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 539.256360][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 539.262750][T18360] BTRFS error (device loop4): open_ctree failed 12:58:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:42 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0240000800000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 539.380307][T18418] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (18418) 12:58:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000001000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000002000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:42 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 539.570514][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 539.576453][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 539.582427][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 539.588238][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 539.594144][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 539.600003][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 539.639206][T18432] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18432) 12:58:43 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000003000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 539.781501][T18434] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18434) [ 539.835177][T18434] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:43 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000004000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 539.941523][T18432] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18432) [ 540.203478][T18434] BTRFS error (device loop4): open_ctree failed [ 540.282765][T18434] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18434) [ 540.323908][T18434] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 540.373260][T18434] BTRFS error (device loop4): open_ctree failed 12:58:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, 0x0, 0x0, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:43 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000005000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:43 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000006000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 540.547114][T18486] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18486) [ 540.571267][T18489] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop3 new:/dev/loop2 12:58:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:44 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000007000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 540.656555][T18502] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18502) [ 540.726652][T18502] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:44 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed020000003f000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 540.932769][T18502] BTRFS error (device loop4): open_ctree failed [ 541.049035][T18502] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18502) [ 541.090204][T18502] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 541.140976][T18525] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18525) 12:58:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:44 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200080040000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 541.300451][T18502] BTRFS error (device loop4): open_ctree failed 12:58:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:44 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02fffffff6000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:44 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02fffffdfc000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 541.601058][T18525] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18525) 12:58:45 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02fffffffe000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 541.798058][T18560] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18560) 12:58:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:45 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 541.851626][T18560] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 541.930417][T18560] BTRFS error (device loop4): open_ctree failed [ 541.936751][T18579] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (18579) [ 542.008191][T18579] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:45 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02fcfdffff000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:45 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 542.150417][T18579] BTRFS error (device loop4): open_ctree failed [ 542.174270][T18588] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18588) 12:58:45 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02f6ffffff000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 542.324346][T18579] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00b10efd9a:0 old:/dev/loop3 new:/dev/loop2 12:58:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:45 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:45 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02feffffff000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:45 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000000034d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 542.559658][T18611] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18611) [ 542.715587][T18611] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 542.724290][T18588] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18588) 12:58:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:46 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000000044d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 543.020459][T18611] BTRFS error (device loop4): open_ctree failed [ 543.166637][T18650] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18650) [ 543.370844][T18611] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18611) [ 543.443347][T18611] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 543.592727][T18650] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18650) [ 543.730390][ C1] net_ratelimit: 18 callbacks suppressed [ 543.730399][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 543.741999][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 543.747807][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 543.753578][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 543.759565][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 543.765428][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:58:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200020000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 543.780501][T18611] BTRFS error (device loop4): open_ctree failed 12:58:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200030000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200040000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 544.118329][T18685] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18685) [ 544.140384][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 544.146355][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 544.176499][T18689] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18689) [ 544.191485][T18685] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200050000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:47 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 544.360455][T18685] BTRFS error (device loop4): open_ctree failed [ 544.366959][T18689] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18689) [ 544.634115][T18685] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18685) 12:58:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:48 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200060000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {0x0}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 544.753802][T18723] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (18723) [ 544.850389][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 544.856297][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 544.870480][T18723] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:48 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200070000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {0x0}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 545.050424][T18723] BTRFS error (device loop4): open_ctree failed [ 545.056918][T18735] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18735) 12:58:48 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000300000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:48 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000500000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 545.405575][T18749] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18749) 12:58:48 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000600000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xde00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 545.592678][T18749] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 545.690556][T18749] BTRFS error (device loop4): open_ctree failed [ 545.846926][T18786] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (18786) [ 545.872909][T18749] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18749) [ 545.898536][T18786] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 545.919375][T18749] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 545.990703][T18786] BTRFS error (device loop4): open_ctree failed 12:58:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {0x0}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000700000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 546.080400][T18749] BTRFS error (device loop4): open_ctree failed [ 546.140815][T18786] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (18786) [ 546.194786][T18786] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200003f00000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000002000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 546.499609][T18786] BTRFS error (device loop4): open_ctree failed [ 546.506275][T18811] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18811) 12:58:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200400008000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 546.604836][T18822] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18822) 12:58:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:50 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000010001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 546.714433][T18822] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:50 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 546.850591][T18822] BTRFS error (device loop4): open_ctree failed [ 546.894299][T18811] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18811) 12:58:50 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000020001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:50 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000030001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 547.260247][T18822] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18822) [ 547.340406][T18822] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:50 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x2, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:50 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000040001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 547.480426][T18822] BTRFS error (device loop4): open_ctree failed [ 547.487139][T18873] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18873) 12:58:50 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000050001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:51 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000060001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:51 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 547.843401][T18873] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18873) 12:58:51 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:51 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000070001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 548.122680][T18901] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18901) [ 548.243999][T18901] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 548.320396][T18901] BTRFS error (device loop4): open_ctree failed [ 548.389403][T18933] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18933) [ 548.620902][T18901] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18901) [ 548.682384][T18901] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:52 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000000003f0001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 548.780453][T18901] BTRFS error (device loop4): open_ctree failed [ 548.812088][T18933] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18933) 12:58:52 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000800400001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 549.010383][ C0] net_ratelimit: 22 callbacks suppressed [ 549.010393][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 549.022551][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:58:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:52 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200fffffff60001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:52 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200fffffdfc0001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 549.261401][T18970] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18970) [ 549.339612][T18970] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 549.473863][T18970] BTRFS error (device loop4): open_ctree failed [ 549.496892][T18993] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (18993) [ 549.650422][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 549.656284][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 549.706854][T18970] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (18970) [ 549.773454][T18970] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200fffffffe0001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3}, 0xfffffffc}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 549.840444][T18970] BTRFS error (device loop4): open_ctree failed 12:58:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 549.970455][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 549.976468][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 549.982785][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 549.988874][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 549.995304][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 550.001376][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:58:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200fcfdffff0001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 550.045880][T19021] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (19021) [ 550.102464][T19025] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (19025) 12:58:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200f6ffffff0001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200feffffff0001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x2, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 550.341216][T19039] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (19039) [ 550.411006][T19025] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (19025) [ 550.412217][T19039] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 550.640444][T19039] BTRFS error (device loop4): open_ctree failed [ 550.738401][T19039] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (19039) [ 550.779697][T19039] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 550.890389][T19039] BTRFS error (device loop4): open_ctree failed 12:58:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000002, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000200000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4801, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x2, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 551.069149][T19082] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (19082) 12:58:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000300000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x2, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 551.421369][T19099] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (19099) 12:58:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000400000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 551.493961][T19082] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (19082) [ 551.514005][T19099] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 551.880429][T19099] BTRFS error (device loop4): open_ctree failed 12:58:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:55 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000500000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', 0x0, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', 0x0, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 552.300649][T19151] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (19151) 12:58:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000001, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:55 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000600000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', 0x0, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 552.554027][T19187] cgroup: fork rejected by pids controller in /syz5 [ 552.561653][T19157] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (19157) [ 552.604324][T19157] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 552.635720][T19151] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (19151) [ 552.833180][T19157] BTRFS error (device loop4): open_ctree failed 12:58:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:56 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000700000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:56 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000003000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 553.283388][T19311] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (19311) 12:58:56 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000005000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 553.430226][T19311] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (19311) 12:58:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:56 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000006000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:56 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 553.584068][T19328] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (19328) [ 553.778386][T19328] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 553.983688][T19328] BTRFS error (device loop4): open_ctree failed [ 554.053481][T19328] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (19328) [ 554.086601][T19328] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 554.130405][T19328] BTRFS error (device loop4): open_ctree failed [ 554.130413][ C1] net_ratelimit: 18 callbacks suppressed [ 554.130431][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 554.148859][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 554.154991][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 554.161097][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 554.166872][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 554.172828][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:58:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:57 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000007000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:57 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:57 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed020000003f000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 554.414912][T19377] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (19377) 12:58:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 554.530100][T19384] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (19384) [ 554.550415][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 554.556228][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 554.563718][T19377] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:57 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 554.676788][T19393] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (19393) 12:58:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000020001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 554.786622][T19393] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 554.821683][T19377] BTRFS error (device loop4): open_ctree failed 12:58:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 554.981099][T19393] BTRFS error (device loop4): open_ctree failed [ 555.008085][T19377] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (19377) 12:58:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200004000080001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 555.250410][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 555.256446][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:58:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:58:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000101004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 555.498547][T19745] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (19745) 12:58:59 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000201004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 555.694326][T19745] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:59 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000301004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 555.850466][T19745] BTRFS error (device loop4): open_ctree failed [ 555.857279][T19756] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (19756) 12:58:59 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000401004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 555.967246][T19770] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (19770) [ 555.993738][T19756] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:58:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 556.340462][T19756] BTRFS error (device loop4): open_ctree failed [ 556.445383][T19893] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (19893) 12:58:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:58:59 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:58:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:58:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 556.561237][T19893] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:58:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:00 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000601004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:00 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000701004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 556.887596][T19893] BTRFS error (device loop4): open_ctree failed [ 556.888057][T20113] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (20113) 12:59:00 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 556.937686][T20132] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20132) [ 556.958676][T20113] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:59:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:59:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:00 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000003f01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:00 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {0x0}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 557.240520][T20113] BTRFS error (device loop4): open_ctree failed 12:59:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:00 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000008004001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 557.463264][T20159] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20159) 12:59:00 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed020000fffffff601004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {0x0}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 557.724232][T20171] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20171) 12:59:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 557.877443][T20171] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:59:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:59:01 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed020000fffffdfc01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 558.001319][T20171] BTRFS error (device loop4): open_ctree failed [ 558.031847][T20191] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20191) [ 558.231926][T20171] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20171) [ 558.272352][T20171] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 558.287678][T20191] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20191) [ 558.560461][T20171] BTRFS error (device loop4): open_ctree failed [ 558.573731][T20202] BTRFS error (device loop2): superblock checksum mismatch 12:59:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff00, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:01 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed020000fffffffe01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {0x0}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 558.630470][T20202] BTRFS error (device loop2): open_ctree failed 12:59:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:59:02 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed020000fcfdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 558.800737][T20223] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20223) 12:59:02 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 559.031979][T20257] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20257) 12:59:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:02 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed020000f6ffffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 559.102021][T20223] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20223) [ 559.116689][T20257] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 559.245990][T20343] BTRFS error (device loop2): superblock checksum mismatch 12:59:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 559.300710][T20257] BTRFS error (device loop4): open_ctree failed [ 559.370470][T20343] BTRFS error (device loop2): open_ctree failed [ 559.410400][ C0] net_ratelimit: 22 callbacks suppressed [ 559.410411][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 559.421956][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 559.451316][T20257] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20257) [ 559.579531][T20257] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 559.670475][T20257] BTRFS error (device loop4): open_ctree failed [ 559.693063][T20343] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (20343) 12:59:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed020000feffffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000002000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 559.932806][T20382] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20382) 12:59:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:59:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000003000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 560.050390][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 560.056188][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 560.130102][T20402] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20402) 12:59:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {0x0}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 560.257792][T20402] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:59:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 560.299050][T20382] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20382) [ 560.370439][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 560.376342][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 560.382243][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 560.388010][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 560.393809][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 560.399667][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:59:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000004000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 560.471348][T20402] BTRFS error (device loop4): open_ctree failed [ 560.680890][T20402] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20402) [ 560.774717][T20402] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:59:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:59:04 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000005000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 560.980456][T20402] BTRFS error (device loop4): open_ctree failed 12:59:04 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {0x0}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:59:04 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000006000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 561.150321][T20454] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20454) 12:59:04 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000007000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:04 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {0x0}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 561.380899][T20468] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20468) 12:59:04 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000030001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 561.544430][T20454] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20454) [ 561.559502][T20468] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 561.690395][T20468] BTRFS error (device loop4): open_ctree failed [ 561.804499][T20468] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20468) [ 561.844587][T20468] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:59:05 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:59:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000050001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1480000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:59:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 561.950420][T20468] BTRFS error (device loop4): open_ctree failed 12:59:05 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 562.114491][T20522] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (20522) 12:59:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000060001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000070001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 562.340594][T20525] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20525) 12:59:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 562.398509][T20535] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20535) 12:59:05 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 562.471469][T20535] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:59:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000000003f0001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 562.600508][T20535] BTRFS error (device loop4): open_ctree failed 12:59:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000002004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 562.682077][T20525] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20525) 12:59:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000003004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:59:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 562.993002][T20535] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20535) [ 563.161185][T20535] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:59:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000005004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 563.320418][T20535] BTRFS error (device loop4): open_ctree failed 12:59:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed020000000000000f004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 563.445136][T20587] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20587) [ 563.504806][T20608] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20608) [ 563.548759][T20608] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:59:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000020004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:59:07 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 563.644556][T20608] BTRFS error (device loop4): open_ctree failed 12:59:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000040004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 563.735417][T20587] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20587) [ 563.880510][T20608] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20608) 12:59:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000010, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:59:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r2 = dup2(0xffffffffffffffff, r1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 564.039958][T20608] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 564.160516][T20608] BTRFS error (device loop4): open_ctree failed [ 564.185838][T20644] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20644) 12:59:07 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000000001cf54e004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, 0x0, 0x0, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:59:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, 0x0, 0x0, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed020000007fffffff004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:07 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 564.517783][T20644] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20644) [ 564.532566][ C1] net_ratelimit: 18 callbacks suppressed [ 564.532576][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 564.532602][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 564.532631][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 564.532657][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 564.532685][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 564.532706][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:59:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000020001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, 0x0, 0x0, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) [ 564.841294][T20674] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20674) [ 564.890789][T20674] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 564.930411][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 564.936192][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:59:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:59:08 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x4, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:08 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000030001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 564.961280][T20674] BTRFS error (device loop4): open_ctree failed [ 565.110415][T20674] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20674) [ 565.165190][T20674] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 565.310441][T20674] BTRFS error (device loop4): open_ctree failed [ 565.320794][T20813] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20813) 12:59:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:08 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000040001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:08 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:08 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000050001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 565.660373][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 565.666208][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 565.674164][T20813] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20813) 12:59:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 565.843843][T20837] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20837) [ 566.047831][T20837] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:59:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:59:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:09 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000060001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 566.212464][T20837] BTRFS error (device loop4): open_ctree failed [ 566.351353][T20962] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 scanned by syz-executor.2 (20962) [ 566.457739][T20837] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (20837) [ 566.480136][T20962] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 566.497148][T20985] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (20985) [ 566.513898][T20837] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 566.670391][T20962] BTRFS error (device loop4): open_ctree failed [ 566.703960][T20837] BTRFS error (device loop4): open_ctree failed 12:59:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:10 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000070001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xde000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:59:10 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000301004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:59:10 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000501004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:10 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000601004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 567.210556][T21017] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (21017) 12:59:10 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000701004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 567.377446][T21041] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (21041) [ 567.400475][T21017] BTRFS error (device loop4): unsupported checksum algorithm: 18459 [ 567.583557][T21017] BTRFS error (device loop4): open_ctree failed [ 567.717184][T21017] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 222 transid 18438444790640683687 /dev/loop4 scanned by syz-executor.4 (21017) [ 567.765293][T21017] BTRFS error (device loop4): unsupported checksum algorithm: 18459 12:59:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e55793e7dc4009c61b487845b1de", 0xca, 0x10000}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:59:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}, 0x81}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002bc0)=""/178, 0xb2}, {&(0x7f0000002c80)=""/207, 0xcf}, {&(0x7f0000002e00)=""/199, 0xc7}], 0x3, &(0x7f00000009c0)=""/58, 0x3a}, 0x3}], 0x4, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000003f01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:59:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94d883e2ff29e1f446b573d4d53cf93079a48da1a1c5567b7ada164cdaee35e2625a386cddb707f54ffefc19be68b6331da2aeb208e521a3dde5939ab25a932fae347233a6d5b7e4c2965ef5590b75b2a4e57b36ef708f7d12a835823727054b250cb14bf6575a000000000000007e7525e557", 0xbe, 0x10000}], 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 567.860418][T21017] BTRFS error (device loop4): open_ctree failed 12:59:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000000034d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 568.000608][T21067] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 18438444790640683687 /dev/loop3 scanned by syz-executor.3 (21067) [ 568.082849][T21071] ================================================================== [ 568.090997][T21071] BUG: KCSAN: data-race in __lru_cache_add / lru_add_drain_all [ 568.098540][T21071] [ 568.100884][T21071] write to 0xffff88812c1299e0 of 1 bytes by task 21073 on cpu 1: [ 568.108610][T21071] __lru_cache_add+0xbf/0x1d0 [ 568.113529][T21071] lru_cache_add_active_or_unevictable+0xb6/0x1f0 [ 568.119956][T21071] __handle_mm_fault+0x1c10/0x2e00 [ 568.125079][T21071] handle_mm_fault+0x21b/0x530 [ 568.129860][T21071] __do_page_fault+0x456/0x8d0 [ 568.134669][T21071] do_page_fault+0x38/0x194 [ 568.139187][T21071] page_fault+0x34/0x40 [ 568.143480][T21071] copy_user_generic_unrolled+0xa0/0xc0 [ 568.149060][T21071] search_binary_handler+0x127/0x420 [ 568.154362][T21071] __do_execve_file.isra.0+0xb6a/0x1140 [ 568.159946][T21071] __x64_sys_execve+0x62/0x80 [ 568.164846][T21071] do_syscall_64+0xcc/0x3a0 [ 568.169374][T21071] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 568.175365][T21071] [ 568.177707][T21071] read to 0xffff88812c1299e0 of 1 bytes by task 21071 on cpu 0: [ 568.185356][T21071] lru_add_drain_all+0x17e/0x3d0 [ 568.190310][T21071] invalidate_bdev+0x6e/0x90 [ 568.194917][T21071] btrfs_close_bdev.part.0+0x93/0xa0 [ 568.200230][T21071] close_fs_devices.part.0+0x161/0x510 [ 568.205709][T21071] btrfs_close_devices+0x92/0x170 [ 568.210747][T21071] btrfs_mount_root+0x793/0x9c0 [ 568.215612][T21071] legacy_get_tree+0x7e/0xf0 [ 568.220255][T21071] vfs_get_tree+0x56/0x1a0 [ 568.224701][T21071] fc_mount+0x20/0x80 [ 568.228710][T21071] vfs_kern_mount.part.0+0xe6/0xf0 [ 568.233835][T21071] vfs_kern_mount+0x49/0x70 [ 568.238373][T21071] btrfs_mount+0x250/0xf37 [ 568.242804][T21071] legacy_get_tree+0x7e/0xf0 [ 568.247401][T21071] vfs_get_tree+0x56/0x1a0 [ 568.251865][T21071] do_mount+0x1004/0x14f0 [ 568.256325][T21071] ksys_mount+0xe8/0x160 [ 568.260709][T21071] __x64_sys_mount+0x70/0x90 [ 568.265314][T21071] do_syscall_64+0xcc/0x3a0 [ 568.269868][T21071] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 568.275775][T21071] 12:59:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000640)=""/154, 0x9a}], 0x5, &(0x7f0000000700)=""/89, 0x59}}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000003100)=""/227, 0xe3}], 0x3, &(0x7f0000000980)=""/58, 0x3a}}], 0x3, 0x23, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x9a3b2000) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r2, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000a00)) r3 = dup2(0xffffffffffffffff, r2) accept4$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0xffffffffffffffcb, 0x80000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$ppp(0xffffffffffffffff, &(0x7f0000000200)="9c92fae71a3e88c33149a1da65c49c9cf080f23fcd1fedaf571b0e3265ecd35f18cc226158dd46ba40cf537dc92e44639ae3c7fc5a319e6c4ed69cd0a155f73225ad3b45d36a19c729574109841ff14f4fc238eaeea76bc9bd4c", 0x5a) 12:59:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000000044d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) 12:59:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000080084d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 568.278103][T21071] Reported by Kernel Concurrency Sanitizer on: [ 568.284275][T21071] CPU: 0 PID: 21071 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 568.292950][T21071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.303019][T21071] ================================================================== [ 568.311092][T21071] Kernel panic - not syncing: panic_on_warn set ... [ 568.317688][T21071] CPU: 0 PID: 21071 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 12:59:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000300004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 568.326365][T21071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.336423][T21071] Call Trace: [ 568.339743][T21071] dump_stack+0x11d/0x181 [ 568.344088][T21071] panic+0x210/0x640 [ 568.348007][T21071] ? vprintk_func+0x8d/0x140 [ 568.352652][T21071] kcsan_report.cold+0xc/0xd [ 568.357261][T21071] kcsan_setup_watchpoint+0x3fe/0x460 [ 568.362804][T21071] __tsan_read1+0xc2/0x100 [ 568.367345][T21071] lru_add_drain_all+0x17e/0x3d0 [ 568.372306][T21071] invalidate_bdev+0x6e/0x90 [ 568.376915][T21071] btrfs_close_bdev.part.0+0x93/0xa0 [ 568.382235][T21071] close_fs_devices.part.0+0x161/0x510 [ 568.387845][T21071] btrfs_close_devices+0x92/0x170 [ 568.393090][T21071] btrfs_mount_root+0x793/0x9c0 [ 568.397957][T21071] ? legacy_parse_param+0xec/0x4b0 [ 568.403082][T21071] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 568.408822][T21071] ? __lookup_constant+0xb2/0xd0 [ 568.413776][T21071] ? logfc+0x440/0x440 [ 568.417856][T21071] ? btrfs_decode_error+0x60/0x60 [ 568.422902][T21071] legacy_get_tree+0x7e/0xf0 [ 568.427510][T21071] vfs_get_tree+0x56/0x1a0 [ 568.431942][T21071] fc_mount+0x20/0x80 [ 568.435932][T21071] vfs_kern_mount.part.0+0xe6/0xf0 [ 568.441053][T21071] vfs_kern_mount+0x49/0x70 [ 568.445575][T21071] btrfs_mount+0x250/0xf37 [ 568.450016][T21071] ? memcg_kmem_put_cache+0x7c/0xc0 [ 568.455240][T21071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.461609][T21071] ? apparmor_capable+0x260/0x470 [ 568.466657][T21071] ? cap_capable+0x134/0x160 [ 568.471263][T21071] ? btrfs_remount+0x930/0x930 [ 568.476030][T21071] legacy_get_tree+0x7e/0xf0 12:59:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000400004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4da72aca94", 0x4c, 0x10000}], 0x0, 0x0) [ 568.480648][T21071] ? legacy_get_tree+0x7e/0xf0 [ 568.485517][T21071] vfs_get_tree+0x56/0x1a0 [ 568.489968][T21071] do_mount+0x1004/0x14f0 [ 568.494414][T21071] ksys_mount+0xe8/0x160 [ 568.498753][T21071] __x64_sys_mount+0x70/0x90 [ 568.503386][T21071] do_syscall_64+0xcc/0x3a0 [ 568.507907][T21071] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 568.513812][T21071] RIP: 0033:0x45dd9a [ 568.517728][T21071] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 568.537465][T21071] RSP: 002b:00007efec65d0a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 568.545996][T21071] RAX: ffffffffffffffda RBX: 00007efec65d16d4 RCX: 000000000045dd9a [ 568.554076][T21071] RDX: 00007efec65d0ae0 RSI: 0000000020000100 RDI: 00007efec65d0b00 [ 568.562062][T21071] RBP: 000000000075bf20 R08: 00007efec65d0b40 R09: 00007efec65d0ae0 [ 568.570049][T21071] R10: 0000000000000000 R11: 0000000000000202 R12: 00000000ffffffff [ 568.578034][T21071] R13: 0000000000000b6f R14: 00000000004cc4c9 R15: 000000000075bf2c [ 568.587518][T21071] Kernel Offset: disabled [ 568.591848][T21071] Rebooting in 86400 seconds..