0x18}, 0x10) 03:09:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x200, 0x4000) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000080)={0x0, 0xffff, 0x1, &(0x7f00000000c0)=0x8001}) bind$alg(r0, &(0x7f000016b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5ad400000000000000000000000000000", 0x18) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='-&!wlan0cgroupem0\x00', r2}, 0x10) bind$vsock_dgram(r2, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) 03:09:32 executing program 0: capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001040)) prctl$intptr(0x26, 0x1) mknod(&(0x7f0000000040)='./bus\x00', 0xffe, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140)=0x1, 0x4) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100), &(0x7f0000000080)) stat(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)) 03:09:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") recvfrom$inet6(r0, &(0x7f0000000080)=""/34, 0x22, 0x10000, &(0x7f0000000100)={0xa, 0x4e20, 0x40, @local={0xfe, 0x80, [], 0xaa}, 0x400}, 0x1c) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000260007031dfffd946fa2830020200a000900000006000000000d00000000ff7e", 0x24}], 0x1}, 0x0) 03:09:32 executing program 6: r0 = getpid() clone(0x200, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) socket$inet_udp(0x2, 0x2, 0x0) execve(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)=[&(0x7f0000000540)='net/mcfilter\x00', &(0x7f0000000440)='\x00'], &(0x7f0000000580)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/mcfilter\x00') read(r1, &(0x7f0000000200)=""/100, 0xffffff66) sched_setaffinity(r0, 0xffffffffffffff4a, &(0x7f0000000140)=0x2) pread64(r1, &(0x7f0000000340)=""/134, 0x86, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000280)={0x1, 0xb26}) tgkill(r0, r0, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180), 0x20000000000, 0x100f}}, 0x20) open$dir(&(0x7f00000000c0)='./file0\x00', 0x27d, 0x0) 03:09:32 executing program 3: r0 = socket$inet(0x10, 0x1000080003, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000040005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x200000, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 03:09:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x5, 0x81) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xbf, 0x40000) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f00000000c0)={0x5, 0x1, 0x0, 0x2, 0x8}) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000018000900004f3b20000000000000f2ffffff00faffffdf00000008001500040000000800160904000400e140b17ed63dc7c44ac84dab0da0fd8169a2716b6c13807ac4a5f37895c28dfe2f19f00189221123f0bddae1ce66661d7c85d04bd0595fd18166055b3fc2ed0fc417a35e2c2ee219160a6648f9cf949b914c315580927ce0265ff625c7f7d49efe0456d88c051f72208038796968a4130d2f9d233fec5ec75e88a18c279148ec6d34022c888df229b13caa733a120725f316a4af73d43cdce293058286698324a63136cc52241fa24a5ff05eeb3e1d6152df00000100eb0e70757142cc6702dc6d91d7edec333b4f28df923fa3fb3864f17950d5ca19c13df8d30cd710bf00dee194081ad044f58fac5a9d66d4db285df87a33eb46324511a6bdd6dbc0a8f164a1e14c069a20d6ae01a1c5fcc68e61b1311a19597d7aabacc675e506ed78b876a3ece83932e2ab7d20aaf4f596252c4376fdf37e67f56aec084b64f37c525a222970503c8cb25b13b8f74a1a8a6bab35082857"], 0x2c}, 0x1}, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200800, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000080)={0x4, 0x40, 0x1, 0x0, 0x6, 0x6, 0x9, 0x0, 0xfffffffffffffffd}) 03:09:32 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x8f) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) bind$alg(r1, &(0x7f0000000600)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(xeta)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000002900)="8a", 0x1}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000540)={&(0x7f00000004c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000a00)=""/164, 0x20000aa4}], 0x1, &(0x7f0000001cc0)=""/141, 0x8d}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') recvmmsg(r2, &(0x7f0000000c00)=[{{&(0x7f0000000140)=@ipx, 0x80, &(0x7f0000000740)=[{&(0x7f00000001c0)=""/161, 0xa1}, {&(0x7f00000002c0)=""/16, 0x10}, {&(0x7f00000003c0)=""/245, 0xf5}, {&(0x7f0000000300)=""/13, 0xd}, {&(0x7f0000000580)=""/104, 0x68}, {&(0x7f0000000340)=""/15, 0xf}, {&(0x7f0000000680)=""/174, 0xae}], 0x7, &(0x7f00000007c0)=""/147, 0x93, 0x8}, 0x1}, {{&(0x7f0000000880)=@xdp, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000900)=""/34, 0x22}, {&(0x7f0000000940)=""/173, 0xad}], 0x2, &(0x7f0000000b00)=""/191, 0xbf, 0xffc000000000}, 0x1e}], 0x2, 0x2040, &(0x7f0000000c80)={0x77359400}) accept(r3, &(0x7f0000000cc0)=@hci, &(0x7f0000000d40)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000021c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000002240)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002280)={{{@in6=@dev, @in=@remote}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000002380)=0xe8) accept4$packet(r2, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000002540)=0x14, 0x800) getpeername$packet(r2, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000025c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000002600)={{{@in6=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000002700)=0xe8) getsockname$packet(r1, &(0x7f000000c600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f000000c640)=0x14) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f000000c680)={@loopback, @multicast1}, &(0x7f000000c6c0)=0xc) getsockname$packet(r2, &(0x7f000000c7c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000c800)=0x14) getsockname$packet(r2, &(0x7f000000c880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000c8c0)=0x14) getpeername$packet(r2, &(0x7f0000011940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000011980)=0x14) getsockname$packet(r2, &(0x7f00000119c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000011a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000d80)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000011b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000011b80)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000011bc0)={{{@in=@local}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000011cc0)=0xe8) getsockname$packet(r2, &(0x7f0000012400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000012440)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000012540)={{{@in6=@loopback, @in6}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000012640)=0xe8) [ 236.032189] netlink: 'syz-executor3': attribute type 15 has an invalid length. 03:09:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x100, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000100)={{0x7, 0x5d103df6}, 0x40}, 0x10) bind$alg(r0, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000900)=[{{&(0x7f0000000280)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x30, &(0x7f00000000c0)}}, {{&(0x7f0000000ec0)=@nl=@proc, 0x2a9, &(0x7f0000001180)=[{&(0x7f0000000140)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0x9d}}], 0x400000000000082, 0x0, &(0x7f0000000000)={0x77359400}) [ 236.087994] netlink: 'syz-executor3': attribute type 15 has an invalid length. 03:09:32 executing program 7: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000140)=ANY=[]) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x28200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400000, 0x0) 03:09:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x8, 0x4, 0x100000000000003, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000080)="2957e1311f16f477671070") r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) ioctl(r0, 0x1417, &(0x7f00000000c0)="473e48d44e4fb52046e12cc8e63a3460555abb397f8a61a10a6ed68c27aa6c037e96ce23b5b94e03fcb2c8fcc6f8133eb19d3d2421db3054be0b142bc977aaac30ff7d63fd959240f8b209d60e318afaee608d4c4730dc576334b1ab74b020cf48711a59306844a1352572") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB='\t\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000240), &(0x7f0000000280)=0x4) 03:09:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x54}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x201, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000300)="2e36f2ad0f01c866b9800000c00f326635010000000f303666839ad1d3cc0fde0965f20f1022baf80c66b8c6bb4d8366efbafc0cec66b8355900000f23c00f21f86635030001000f23f80fc72e0000ba2000b84e6cef", 0x56}], 0x1, 0x0, &(0x7f00000001c0), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname(r0, &(0x7f0000000040)=@nl, &(0x7f00000000c0)=0x80) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f00000001c0)=0x54) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000380)={r2, 0x1, 0x8, r4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:09:32 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x7fff, 0x2, 0x80000001, 0x240000}, {0x4, 0x7, 0xffffffffffffffc1, 0x16}, {0x299, 0x15, 0xb4, 0x100000001}, {0x15, 0x0, 0x16f0ad97}, {0x2bf, 0x2, 0x7, 0xbc}, {0x65, 0xffffffffffff88ee, 0xa6, 0x401}]}, 0xffffffffffffff65) 03:09:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000020ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000020000)={0x13, 0x18, 0x401, 0x0, 0x0, {0x1d, 0x2, 0xf}}, 0x14}, 0x1}, 0x0) fcntl$setlease(r0, 0x400, 0x1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) 03:09:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x8}, {0xa}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) tgkill(r2, r3, 0x20) prctl$getname(0x10, &(0x7f0000000200)=""/4) 03:09:33 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = syz_open_dev$sndpcmp(&(0x7f0000001880)='/dev/snd/pcmC#D#p\x00', 0x7, 0x80) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001900)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000001a40)={&(0x7f00000018c0)={0x10, 0x0, 0x0, 0x8008000}, 0xc, &(0x7f0000001a00)={&(0x7f00000001c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=r2, @ANYBLOB="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"], 0xa4}, 0x1}, 0x80) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x0, 0x0, 0x4) fallocate(r3, 0x20, 0x0, 0xfffffeff000) write$cgroup_int(r3, &(0x7f0000000180), 0x1) lseek(r3, 0x0, 0x4) 03:09:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x47, &(0x7f00000000c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x400000) 03:09:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d70") r1 = dup(r0) ioctl$EVIOCSKEYCODE(r1, 0x40104593, &(0x7f00000000c0)=[0x1, 0x40]) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000040)={0x0, 0x9, 0xae3e, 0x0, 0xe}) 03:09:33 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f00000000c0)="295ed277a4200100360070") r1 = socket(0xa, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x38, &(0x7f0000004f40), &(0x7f0000000000)=0xfffffffffffffdef) sendto$inet6(r0, &(0x7f0000000040)='5', 0x1, 0x4000000, &(0x7f0000000080)={0xa, 0x4e23, 0xffffffff, @mcast1={0xff, 0x1, [], 0x1}, 0x1f}, 0x1c) 03:09:33 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x20000, &(0x7f0000000080)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000040)='./file0/file0\x00', r0}, 0x1e058f28d6f55f78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0/file0\x00'}, 0x10) 03:09:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xff, 0x10, 0x1, r1}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x103400, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000100)=""/144) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000001c0)={@remote, @multicast2, @local}, &(0x7f0000000200)=0xc) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f0000000280)={0x60000000}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000002c0)=0xfffffffffffffff7, 0x1) connect$vsock_dgram(r1, &(0x7f0000000300)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) bind$pptp(r1, &(0x7f0000000380)={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x1e) setxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@random={'osx.', '/proc/self/net/pfkey\x00'}, &(0x7f0000000440)='\x00', 0x1, 0x1) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000004c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000540)={0x9, 0x108, 0xfa00, {r7, 0xcc, "f2f5b4", "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"}}, 0x110) getpeername(r6, &(0x7f0000000680)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f0000000700)=0x80) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000740)) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000780)='veth1_to_team\x00', 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000007c0)=[@in6={0xa, 0x4e21, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x2}], 0x1c) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000800)=""/136) ioctl$TIOCSCTTY(r5, 0x540e, 0xfff) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10}, 0xc, &(0x7f0000000a00)={&(0x7f0000000940)={0xbc, r8, 0x400, 0x70bd2c, 0x25dfdbfb, {0x10}, [@IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @rand_addr=0x81}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2=0xe0000002}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40}, 0x20040014) fstat(r5, &(0x7f0000000a80)) pwritev(r5, &(0x7f0000000d40)=[{&(0x7f0000000b00)="30143af9f5255ab338adc38f065a094d70a2f19ad824161cc9e251c29f6a47891d05b15600e7616abaae762d6e56f18e813097a4ac43c4ea4f42b66ea675c0689c6763538126c51eda7bc356c3d32d205981d0ffdff8a23d435eb05574572796cf7f1e8d78617a073d64b824ef7ec4986c8fb15fce94458747e9155a87edddba3bc1dc987cb26c7b3341256019ec14b026dad5a61088", 0x96}, {&(0x7f0000000bc0)="f4c8498ee4b201de3356f67bcd7d8443153bebcf9f4eb32a67d2f4ddf453e458b7e21c52", 0x24}, {&(0x7f0000000c00)="2b78fb1aa8cb3d6badbef04133654f2ba261f089d6b6e1f2d2331e0cb2f9b2a99868b1da33b75782b8b9f41f2c0d646902600a4b9b93304b85841ee67059b4a62eac1c5df8df5151b77bef531e3086f9776f09ff4d22dbe4a266691797c306e46abe27cc1890e6b302c4826b41a64c5c6e404756f8a652b171e34e0bcffe1c98e97077e17f195dde573fdc70b0691cc463457c5234f7046c9668df282ed73cd6f18bd612c87fff864b83dff38dfb532c6998113c72f03cbf352bbd4fa86a4748f41b56f0887aa3a4a6cd8d33f7fa", 0xce}, {&(0x7f0000000d00)="a741b19dff30fb25a7ba14f1384104b191c326c3d35d2357ee00c6470ecc3b", 0x1f}], 0x4, 0x0) accept$packet(r6, &(0x7f0000000d80), &(0x7f0000000dc0)=0x14) 03:09:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1, 0x0) accept4$unix(r2, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e, 0x80800) ioctl(r1, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x6, 0x71, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(r0, 0x800454df, &(0x7f0000000340)=""/4096) 03:09:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x4, &(0x7f0000013ff4)={@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr, @multicast2=0xe0000002}, 0xc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x4, &(0x7f0000000040)={0x0, 'veth1_to_bond\x00'}, 0x18) close(r3) dup3(r1, r2, 0x0) 03:09:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x9, 0x0, 0xffffffffffff2f0c, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYRESDEC=r1, @ANYBLOB="cb000000672f8da1a611456b10d1d4f4b5e7621f48f350870abed96901429d1185f3bc2c13cae75ced02005279000b984316519e220de5e3cbbdc43652ccc01b4a5f49c87793726fd62d5911933ede19fb94896b2c7172156eeff4ea3c0ba18432e1b122559c6b7f06cbcf78da10eadec43854887901e151bd74ad582981c58b1add3d9daebd2b336c9ebeae689b335cff3f1e4f051716ae888ed1990c276d9e71bccad95ec82ae65cf2fb2c07504e899a0e00d34662c189a281ded5230c71df5e7d9f86081548789aeab3139a2429b8a1906116"], &(0x7f0000000380)=0x2) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000002440)=ANY=[], 0xff07) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000003c0)={0x0, 0x0, [0x2, 0x7, 0x1, 0x7]}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000002940)='./bus\x00', 0x0) ftruncate(r2, 0x8200) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000100)) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x44000) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000040)) writev(r2, &(0x7f0000002880)=[{&(0x7f0000002800)='5', 0x1}], 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, 0x0}, &(0x7f0000000480)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80, [], 0x14}, 0x70, r5}) 03:09:33 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4000, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000100)={0x81, 0x4, 0x5, 'queue0\x00', 0x4}) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x1ff, 0x208080) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xfffffffffffffffa) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x10001, 0x0, 0x5, 0x8001}, &(0x7f00000002c0)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e21, 0x1f74000000000, @mcast1={0xff, 0x1, [], 0x1}, 0x100}}, 0x20}, 0x90) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000003c0)={@mcast1, 0x0}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000540)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000580)={{{@in=@broadcast=0xffffffff, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e20, 0x41d2362, 0x4e24, 0xc60a, 0xa, 0xa0, 0x0, 0x8, r3, r4}, {0x6c6, 0x5, 0x100000000, 0x3, 0x1, 0xee8, 0x5, 0x6}, {0x9a, 0x2, 0x3, 0x5}, 0x8, 0x0, 0x0, 0x0, 0x3}, {{@in6=@loopback={0x0, 0x1}, 0x4d6, 0x33}, 0x2, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x34ff, 0x1, 0x0, 0x2, 0x1, 0x515a, 0x9}}, 0xe8) r5 = syz_open_dev$mice(&(0x7f0000000680)='/dev/input/mice\x00', 0x0, 0x800) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='cramfs\x00', 0x800024, &(0x7f0000000780)="54ffd9f2f19701acb45113fb5ba7967af9c9f3805dd22cc2d0ea407db2fcef8e7fb8589abe0963c9205366812211eff444b05bc55340b501f887a72d42790b93a6f2761e59aa79cccc7513e74e664ade5fa52e7c67e402a46fbeb4db4f8f3092a58371b1cd5eb9d44d25017abd482f65cd2bc02656ef44ef05466fe5a8da78f6f1d03e61fcb1292ef516515124834efe8fa95b394659c982999840d0d6db8bea62c07a") getsockopt(r0, 0x0, 0x180000000, &(0x7f0000000840)=""/48, &(0x7f0000000880)=0x30) preadv(0xffffffffffffffff, &(0x7f0000001c00)=[{&(0x7f00000008c0)=""/223, 0xdf}, {&(0x7f00000009c0)=""/119, 0x77}, {&(0x7f0000000a40)=""/178, 0xb2}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/227, 0xe3}], 0x5, 0x0) r6 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_LOCK(r6, 0xb) syz_mount_image$xfs(&(0x7f0000001c80)='xfs\x00', &(0x7f0000001cc0)='./file0\x00', 0x2, 0x3, &(0x7f0000001f00)=[{&(0x7f0000001d00)="e2f573cb3f2ee107e023f17075fe2da617d1d66c10643fba43083c6e8b518039bd8be6e5a362d7d6244354a45e15", 0x2e, 0x5}, {&(0x7f0000001d40)="e2a79c5c48a5cdafb5430a460f78bec44663edac628a4682a09167d0a5d0b56a24041e919d00d7f9f14bf36542f5813d5d94454f7994a86e8fbb0bfd7d6bf333335f3fc59e2a63038ba9ef2b40967356db15ae891e94b15790dca85738550a74d3a4ac9072daae90865a8d49bdada7781a57b122958403498604fad4b147201df8ddfe97317a1ddf30ecd649868da3eba9b215f65fe71659e039005d628039b1cd2a74", 0xa3, 0x5}, {&(0x7f0000001e00)="8b3a0aeeaf8f08837bac7959d1d4dcc74de26917e9f3afe8f690ad0206f98d8c830133b96fda0534acae57146405d6165e6b93a052f2c659b14f81506b315d9017c4612c336d2b8a149dafdd7150ed484bd5389af50f1dbbe4881a89f42132bc15ac5de823cbb3f0802bca6093a1be4981807b85629773670b8927605736e2b242db7e5e23bffe4fca66c1d8c446fc46ef8cc8e98174c0e1b1941f416b2caa1b430c1ff8d8128aae2c293246fbfd90c65c932fa9f29362e55bce0624dd9d1521b02f0ed95b67fa6818540756c51a63927fe134770026b20cc14a2740ee2e7d1552790e", 0xe3, 0x80000001}], 0x1, &(0x7f0000001f80)={[{@nouuid='nouuid', 0x2c}, {@nouuid='nouuid', 0x2c}, {@noikeep='noikeep', 0x2c}, {@pqnoenforce='pqnoenforce', 0x2c}, {@inode64='inode64', 0x2c}, {@quota='quota', 0x2c}, {@uqnoenforce='uqnoenforce', 0x2c}]}) utime(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)={0x9, 0x100}) unlink(&(0x7f0000002040)='./file0\x00') ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000002080)={0x10200, 0x0, &(0x7f0000ffa000/0x4000)=nil}) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000020c0)={0x7, 0x30, 0x6, 0x0, 0x0, [{r0, 0x0, 0x6}, {r1, 0x0, 0x755}, {r1, 0x0, 0xffffffff7fffffff}, {r1, 0x0, 0x20}, {r5, 0x0, 0xffffffffffff8000}, {r1}]}) openat$full(0xffffffffffffff9c, &(0x7f00000021c0)='/dev/full\x00', 0x40000, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000002200)={0x1, {{0xa, 0x4e23, 0x4d1a, @loopback={0x0, 0x1}, 0xfffffffffffffffb}}, 0x1, 0x1, [{{0xa, 0x4e20, 0x40, @dev={0xfe, 0x80, [], 0x17}, 0x567}}]}, 0x110) setsockopt(r1, 0x84, 0x7, &(0x7f0000002340)="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", 0x1000) ioctl$sock_inet_SIOCGIFBRDADDR(r5, 0x8919, &(0x7f0000003340)={'yam0\x00', {0x2, 0x4e24, @rand_addr}}) epoll_create(0x96) openat(r0, &(0x7f0000003380)='./file0\x00', 0x42000, 0x0) 03:09:33 executing program 6: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x4000203) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @rand_addr=0x1}, {0x307, @random="b231ed2f9cdb"}, 0x4, {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 'ifb0\x00'}) r1 = socket$inet(0x28, 0x1, 0x7fffffff) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x28, 0x483, &(0x7f0000000000)={0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'sed\x00'}, 0x2c) 03:09:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x24000, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x8, 0x9c7, 0x0, 0xfff0}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:09:33 executing program 6: socket$inet6_udp(0xa, 0x2, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'user.', '#@keyring]bdevem1({#$keyring(vmnet1-proceth1mime_type\x00'}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 03:09:33 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) ptrace$getsig(0x4202, r0, 0x80000001, &(0x7f0000000100)) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1f, 0x40000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x1ff, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, @in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}], 0x2c) r2 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000001940)={0xf, 0x8, 0xfa00}, 0x10) 03:09:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x8000000000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x89a5}) 03:09:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x24000, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000080)={0x8, 0x9c7, 0x0, 0xfff0}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 03:09:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0xfffffffc, &(0x7f0000000040)="025cc83d6d345f8f7620708860572d8c398cbfff0a7b55eda1967fc62c5a51fe63d77c073e2365ce34ea7dac904884ae93ea65f8c5185c62a4cdf56b74a7e2fde33cb697c2477d1d1b1a05fbdd8b1c28d7010000000000000098c0c5a5ca72b9ed839c160650f122fb67661fb84f27a7175f64e250124d244e8ea2386f7af9880c822c26e524639723cc2e01e225536ab5119c609ec78cc11753938fa09ceb59895e2abe9b3b136a22bb0d7d90e607980ca0033d8b330587817b76e1ac4cf2") r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000019c0)={&(0x7f0000001840)={0x10}, 0xc, &(0x7f0000001980)={&(0x7f0000001880)={0x20, r1, 0x201, 0x0, 0x0, {0x1}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1}]}]}, 0x20}, 0x1}, 0x0) getsockname(r0, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000000)=0x80) [ 237.211911] XFS (loop1): Invalid superblock magic number 03:09:34 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f0000000500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/174, &(0x7f0000000100)=0xae) ioctl$FS_IOC_FSSETXATTR(r0, 0x80047453, &(0x7f0000000000)) [ 237.314820] netlink: 'syz-executor4': attribute type 1 has an invalid length. 03:09:34 executing program 0: mlock(&(0x7f0000ff2000/0xe000)=nil, 0xe000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x345200, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={r1, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0xa}}, 0xc) r2 = socket$inet6(0xa, 0x3, 0x4) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0xc, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) 03:09:34 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='\'{-*\x00', 0xffffffffffffff9c}, 0x10) getsockname(0xffffffffffffff9c, &(0x7f00000002c0)=@can={0x0, 0x0}, &(0x7f0000000380)=0x80) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000003c0)={r2, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000400)={0x1, 0x1, [@random="9d65c7666c44"]}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000230000000002800000850000000000fc0095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x10, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x47}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) 03:09:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000000), 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r0]]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:34 executing program 7: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) recvfrom$inet6(r0, &(0x7f00000001c0)=""/76, 0x4c, 0x10002, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000240)={'ah\x00'}, &(0x7f0000000280)=0x1e) r1 = getpgid(0xffffffffffffffff) fcntl$setown(r0, 0x8, r1) ptrace$getregs(0xc, r1, 0x5, &(0x7f00000002c0)=""/44) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x5, &(0x7f0000000300)=""/150) getpriority(0x0, r1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x400000, 0x0) getdents(r2, &(0x7f0000000400)=""/176, 0xb0) readlinkat(r2, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=""/239, 0xef) ioctl$VT_RELDISP(r2, 0x5605) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x16) r3 = syz_open_dev$binder(&(0x7f0000000600)='/dev/binder#\x00', 0x0, 0x802) process_vm_readv(r1, &(0x7f0000002b00)=[{&(0x7f0000000640)=""/123, 0x7b}, {&(0x7f00000006c0)=""/117, 0x75}, {&(0x7f0000000740)=""/120, 0x78}, {&(0x7f00000007c0)=""/213, 0xd5}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/72, 0x48}, {&(0x7f0000001940)=""/187, 0xbb}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/159, 0x9f}, {&(0x7f0000002ac0)=""/64, 0x40}], 0xa, &(0x7f0000002e40)=[{&(0x7f0000002bc0)=""/121, 0x79}, {&(0x7f0000002c40)=""/59, 0x3b}, {&(0x7f0000002c80)=""/192, 0xc0}, {&(0x7f0000002d40)=""/244, 0xf4}], 0x4, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002ec0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000002fc0)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x210}, 0xc, &(0x7f0000002f80)={&(0x7f0000002f00)={0x4c, r4, 0x100, 0x70bd2d, 0x25dfdbfb, {0x6}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback=0x7f000001}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000004) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000003000)) mq_timedsend(r2, &(0x7f0000003040)="c56f5a0a984b14905cb419203b44bc6e972b8a8d1166a5f87ff72409eb925b8033cbd3b8f2ebb7e7795f9d80348a360f5722673a1285cbb61bbefd5af6ce826cb633a3d70712895b7cb5158f0006168ae277999948def2204e05be28015a3c1aa3662a418abbae0841a1661893da7546b878d05705f30ad6e84113a13bf065a696cc3b0dd98b9518a49de377701b34f9da2d", 0x92, 0xd5, &(0x7f0000003100)={0x0, 0x989680}) ptrace$peek(0xffffffffffffffff, r1, &(0x7f0000003140)) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000003180)={0x0, 0xf9, "df3a06d573d475198a0c6d5ab75fa5c4715877edc1b8a00d3ae058d185e85cbea5832eac48c3f1f616da1d130e3ca73a897b7f8991435f0fc04c71c2792d165de52a5a0f3ef50cb32250746a0bfc31d31e6763ee1f8dd0925de048d9e012d8e28785cb1405f76b1b68aabada44257452f90e8475733d4e127bac49cc548e5aa99ed3480fa18289184e702228c8da13b4647fb98bf51b80abcdabdf9a80fe8cc5d6f30d42d19b9bf1353324a220ce74f6ba8c9525907e70f77c20d187d8658536751f4a04f8a2a013cb3a78019ebc4106cfe6c48acf6a6e8706c673eff02694d9fff5a68602b4e8d7a0359ebb355ce94b2867d3b66c27367333"}, &(0x7f00000032c0)=0x101) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000003300)={r5, @in6={{0xa, 0x4e22, 0x10001, @dev={0xfe, 0x80, [], 0x1e}, 0x7f}}, 0x800, 0x80, 0x101, 0xffffffffffffffe0, 0x10}, &(0x7f00000033c0)=0x98) connect$inet6(r2, &(0x7f0000003400)={0xa, 0x4e23, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) write$binfmt_script(r3, &(0x7f0000003440)={'#! ', './file0', [{0x20, '/dev/binder#\x00'}, {0x20, 'bdev!GPL^posix_acl_access#'}, {0x20, 'vboxnet0'}, {0x20, 'ah\x00'}], 0xa, "b917f933ad5dc8df77093fa9dfccb8f200fa3c6443a31939ce9da8ab243c48031ed022fcab4418078225a44ca203a36b90e74609bfe1fbc48752d9ae93c1235458ab0512affc5fa3033bae98decee2cf3307a22b53eedc00b4296e48ef8d909fc35791b15d5e24184860a754cb3218f280d1f4a35cd1c88c6f97dfe2d704d4c9365f91e1dfa40e721b404a1bdecadc21a3608b351c15471c8d97607e216b3eb9d4efd3387affbb06000e941edd594b35eac4187bd5bbe4b2198bdcc873b35fa77560c3e7529734a4bde68d28bca22038cf616319a295e24c4fd3001ed6fe293e7d3fc95b8848744fd259fd4bc1230c83cd051b"}, 0x134) recvfrom$unix(r2, &(0x7f0000003580)=""/67, 0x43, 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000003600)=r6, 0x4) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000003640)) fcntl$addseals(r0, 0x409, 0x8) migrate_pages(r1, 0x800, &(0x7f0000003680)=0x9, &(0x7f00000036c0)=0xfffffffffffffe00) [ 237.377601] netlink: 'syz-executor4': attribute type 1 has an invalid length. 03:09:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x240, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000100)={0x3ff, 0xb6d, 0x2, 0x2bf, [], [], [], 0x8, 0x100000001, 0xfffffffffffffffb, 0x2, "aa3e8461251e4795c1e1bf5fbf76dcc9"}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') sendfile(r1, r0, &(0x7f00000000c0)=0xffffffffffffffff, 0x81) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000080)={0xff, 0x2, 0x4}) 03:09:34 executing program 2: socket(0xf, 0x803, 0x4) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0xffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="d6000000798ae743958a78c9b1bd4abc26b12ea1b0d59186153b3a07fe7825d6ed5b7d3244247be01f69ce8e6cdb2611099c1fa6190e15357c1c3845a34c107bfc294d036f372d77dc50ea8ddaf612cb65d3c0fce72afdda8c1c27fb2783bdfb04013ff0b14438b6131000ded6e6f78f2cd61405000000f0d34bfa29a184d381017bd7c5414dabb041c6d3816349e4eafcebf46f7d48d9f77beba42319e409896bb8d9529afb8c13d323a8cc822d54705fb9f8a573cdc19432dab6bd0d7ef3639fe34aaadc0f2946650ab5323b5ebdbd21c6d7d4e00771780000"], &(0x7f0000000200)=0xde) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) unshare(0x400) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="5f810000eacf6429f393d6f8221b1f67c7df951071dbb243dd57a4e2e2b553f1bfbbd0c883621c424b697b902e162c40ea4cf685ad7cc53c484bfe986c89c1e32ea7afbcc9dffcd61bc9e7dc86e2630c7b8cbdd0b8bc4c17f14b80e6046586094a5cc4"], &(0x7f0000000240)=0x67) 03:09:34 executing program 3: perf_event_open(&(0x7f00000000c0)={0x800000000002, 0x70, 0x3e6, 0x0, 0x0, 0x28d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x4000) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x8000, 0x2400000, 0x0, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r1, 0x5, 0x6, [0x0, 0x1, 0x7fff, 0x8, 0x200, 0x10001]}, &(0x7f0000000200)=0x14) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2}}}, 0x108) 03:09:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r2, 0x407, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) fcntl$setstatus(r2, 0x407, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)) dup2(r1, r3) 03:09:34 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) r1 = add_key(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000100)="d71cef5ac309a72ecc602704910b2c447c6539f66463121bea1b1944df9897c275c1f37b389b2cb28ebce89394a1015cf994ea4be7eb917d6962804e031b02822d98b29a2426ab4f12e8f60625280c443939cfb3490f6665f9de1701bcc9a93c4e314bb7cd61f1a97c0c1a7d6ca1d887958aa692b191c0d18967d706ba7fb96eafdd13ca9671250d661bf49dd6e9202a907705cf783937e39ae70a01e9e510409ae7b00404d95e446bc22de82d7c3f8c00b2a754d9c0afe5bae583982b340a68d57da1246bd6a4ed0fa81bf121b8002ff3a6c9654b8d23ae5d6b", 0xda, 0xffffffffffffffff) keyctl$get_security(0x11, r1, &(0x7f0000000200)=""/18, 0x12) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x4e21, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6006f5260008110000000000000000000000000000000000ff02000000000000000090e9547fd3b238f04e22000890781dc7a264b9f6029c313b8ff52ea9090f2ef55a253c3837a893da8960254f5cb4f65bae4dbb2f4db5d666f3204f8c1ab67c5c5f80"], &(0x7f0000775000)) 03:09:34 executing program 5: syz_emit_ethernet(0x3fe, &(0x7f0000000300)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3f0, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x1c, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}}, @igmp={0xd, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f00000002c0)) syz_emit_ethernet(0x30, &(0x7f0000000000)={@random="e3c00171f5c7", @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1c}, [{[], {0x8100, 0xdd73, 0x100, 0x3}}], {@llc={0x4, {@snap={0x1, 0xab, 'Q', "e67b09", 0x663, "28c8ac62c2a6dd08368946b7b8b4ea116ca293f02f41"}}}}}, &(0x7f0000000040)={0x0, 0x4, [0xfbf, 0x321, 0x10d, 0x17a]}) 03:09:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)}}, {{&(0x7f0000000800)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80, &(0x7f0000000a00), 0x0, &(0x7f0000000a40)}}], 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$netlink(r1, 0x10e, 0x3, &(0x7f00000000c0)=""/36, &(0x7f0000000180)=0x24) 03:09:34 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4, 0xa0000) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f0000000380)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000003c0)='\x00\x00\x00\x00\x00', 0x100000, &(0x7f00000009c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='.', &(0x7f0000000480)="b3b8155713fb18dea1325403cf49458ea055d7591982903d491d14c2e9cbc39e8bf705c21d4cc6c570ba1b1b03c6db40040c163a6dee9329d669c3a83a02ef2119957d6d4d06f79c5d29c3f97acbbbd1a0034898939712cc63020f31107f31c3a7ea6b055a3d9cd058451eefee6ebdb0357831796761e16f810e2452be7d0bbb99ee890739873f2de48187428342a5e95f625e7b49265dcb01cdb718bd2920863ed6af48bf044ad87394625a24423d5fefebc93d3a4a96d582c636a0bc3ec3fa80854deb41daa221d12ed5bdc1aeaabed9dcbb850b47a98ab25649387ab11d7b205a07b9082b736c17f97d", 0x1004, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='binfmt_misc\x00', 0x80000, &(0x7f0000000900)) openat$cgroup_int(r0, &(0x7f0000000340)='cpuacct.usage\x00', 0x2, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000700)='fuse\x00', 0x9000, 0x0) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000100)='.', &(0x7f00000002c0)='mslos\x00', 0x3002480, &(0x7f0000000700)) mount(&(0x7f0000000140)='.', &(0x7f0000000380)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000180)) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000400)={[0xd000, 0x1, 0xd000], 0x3, 0x2, 0x1}) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000580)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000740)={0x15, 0x110, 0xfa00, {r1, 0x7fffffff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x7}, @ib={0x1b, 0x7, 0x200, {"c4089d67461f37028fb18e0b6206f3e9"}, 0xfffffffffffffff7, 0xd6, 0xbf8}}}, 0x118) 03:09:34 executing program 7: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x81000000000001) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) r1 = socket(0x40000000015, 0x7, 0x800) bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) migrate_pages(r2, 0x7fffffff, &(0x7f00000000c0)=0x1f, &(0x7f0000000100)=0x1) sendto$inet(r1, &(0x7f0000f7db7f), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmmsg(r1, &(0x7f0000001380)=[{{&(0x7f0000000780)=@pppol2tpin6, 0x80, &(0x7f0000000e40), 0x0, &(0x7f0000000f00)=""/14, 0xe}}, {{&(0x7f0000000f40)=@pppoe, 0x80, &(0x7f0000001280), 0x0, &(0x7f0000001300)=""/118, 0x76}}], 0x2, 0x10000, 0x0) write$binfmt_elf32(r1, &(0x7f0000001400)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xbedb, 0x5, 0x3, 0x200, 0x2, 0x3f, 0x0, 0x248, 0x38, 0xb1, 0xfffffffffffffffc, 0x3f, 0x20, 0x1, 0x101, 0x9, 0xffffffff00000000}, [{0x4, 0xffffffff, 0x3f, 0xfffffffffffffffd, 0x216, 0xffff, 0x20, 0x9}], "38cd3e6b0a569cf93be5bfcb90c422a5b5df1f27c510ad218b1b5b63dfe0a716cba1af9f8567e74f01b1b7f528c7c31d255e37b5351e8e532e3f02c2aebecdb8bb86757524818f565bfcc96762af8a92b7c18cfe6183e3e1f2f4b658535dc5a84b2bf4c6039b23661327b9182f3fe985876369fa44d3c515166c119fa1c067105febd6515534f6e761b18a355ba03a26c001b1038d178fca64de64699c987f587246a8847fa73cac32d9ab610c620f3ec4f77ca8a3cf549b02257bf6a778f423d98dd5eb13074d0461a6c9d555374d7dd49b7e61cd968e22195f3bccde3d4dba7691a167571334331bc3c444f5a67db94b95", [[], [], [], [], [], [], [], []]}, 0x94a) 03:09:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000000000002, &(0x7f0000000240)="025cc83d6d345f8f762070") fstat(r0, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000140)={0x10, 0x0, [0x40000002]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x30400, 0x0) r4 = fcntl$dupfd(r3, 0x406, r3) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$BLKSECTGET(r4, 0x1267, &(0x7f00000002c0)) mq_timedsend(r4, &(0x7f00000000c0)="452f1ffb0b1649752b04e3d1f74cf8e4421942a78877f0e90ea69520bdec75445b4ca99f26791c30f1dfc4ee063392c3acfc0f4c6140f5dccf548833a00f05d9f9117f48bc48d2e3b4ecdb35ac", 0x4d, 0x5, &(0x7f0000000200)={r5, r6+10000000}) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000300)={0x1d, 0x0, 0x641c3ce4}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) 03:09:34 executing program 3: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000080)={0x80000000, 0x4}) ioctl$BLKPG(r0, 0x80140912, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f00000000c0)}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x117, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x0, {0x8000, 0x0, "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", 0xf8, 0x9, 0x7, 0x2, 0xffffffffffffffff, 0x8a, 0xfffffffffffff5d5}, r2}}, 0x128) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000000)={0x67fd, 0xffffffffffff8000, 0x1}) 03:09:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = shmget$private(0x0, 0x3000, 0x54000000, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f00000012c0)=""/4096) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000180)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$KVM_SET_GUEST_DEBUG(r2, 0xc018ae85, &(0x7f0000000040)) 03:09:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x9c, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x4, @loopback={0x0, 0x1}, 0x5}, @in6={0xa, 0x4e20, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x49}, @in6={0xa, 0x4e23, 0x40, @dev={0xfe, 0x80, [], 0x17}, 0x20}, @in={0x2, 0x4e22, @multicast1=0xe0000001}, @in6={0xa, 0x4e24, 0x2, @remote={0xfe, 0x80, [], 0xbb}, 0x81}, @in6={0xa, 0x4e22, 0x200, @dev={0xfe, 0x80, [], 0x17}, 0x3}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000180)={r1, 0x8, 0x1000, "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"}, 0x1008) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000011c0)={r1, 0x46, "194244f693f8ba0fb2d98821e381230e20c5aa5d35d5e7de5f6fddc8799ac883dfd0bda3372fc95c07b163ce7e5fc66336a7bab7d817ae006b13c978f367c963d48c3e584363"}, &(0x7f0000001240)=0x4e) connect$llc(r0, &(0x7f0000001280)={0x1a, 0x33d, 0x6, 0x7, 0x2, 0x8d, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}}, 0x10) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f00000012c0)='ppp0trusted!.-self\x00', r0}, 0x10) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f0000001340)=""/192) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000001400)=[@in={0x2, 0x4e20, @multicast1=0xe0000001}, @in={0x2, 0x4e20, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x20, @loopback={0x0, 0x1}, 0x71e8}, @in6={0xa, 0x4e23, 0x7, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x6}], 0x58) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001480)={{{@in6=@mcast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000001580)=0xe8) setfsuid(r3) ioctl$int_in(r2, 0x5421, &(0x7f00000015c0)=0x4) chdir(&(0x7f0000001600)='./file0\x00') r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(r4, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000001640)=""/4096) lookup_dcookie(0x1282, &(0x7f0000002640)=""/123, 0x7b) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f00000026c0)={0x8, 0x401}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000002700)) connect$vsock_stream(r0, &(0x7f0000002740)={0x28, 0x0, 0x2711, @hyper}, 0x10) write$P9_RWALK(r2, &(0x7f0000002780)={0x16, 0x6f, 0x1, {0x1, [{0x21, 0x3, 0x7}]}}, 0x16) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f00000027c0)) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000002840)={0x2, {0x2, 0x4e24, @broadcast=0xffffffff}, {0x2, 0x4e23, @multicast2=0xe0000002}, {0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, 0x40, 0x10000, 0x80, 0x3, 0x2, &(0x7f0000002800)='eql\x00', 0x9cf, 0x3}) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000028c0)='tls\x00', 0x4) syz_mount_image$ceph(&(0x7f0000002900)='ceph\x00', &(0x7f0000002940)='./file0\x00', 0xff, 0x2, &(0x7f0000002a80)=[{&(0x7f0000002980)="99bb5197040cefd42c935444", 0xc, 0x9}, {&(0x7f00000029c0)="17de5623fdc56c63c836bb6b5f5c561b217f94b30144864e89a92d6a00e73f1b8e6346f2b27cce7db0b181b11455d53a76a207e63bfd018e93853e86ff893bbdb7150080dfe55f7e99e642d2edffc5372dd9dcbf7096c68447967a10568c328c7c518440f1c37dc33262a2a2e13f5b8b8c6a9b014b1347dc0261f1726a9cf8c4fb72ff02f3dd517cd83aca835822ca9f028727832ae71d8809005b8999326b11be8c", 0xa2, 0x9857}], 0x64000, &(0x7f0000002ac0)='tls\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000002b00)='/dev/urandom\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000002b40)={{0xed6f, 0x7}, 'port0\x00', 0x1, 0x100000, 0x6, 0x7, 0x400, 0x9, 0x5310beca, 0x0, 0x2, 0xfffffffffffff800}) socket$netlink(0x10, 0x3, 0x12) 03:09:34 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000c5ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2, &(0x7f0000000000)='S') 03:09:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x2}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r3 = fcntl$getown(r1, 0x9) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2002, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000080)={r4, r0, 0x2}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@dev={0xfe, 0x80, [0x100000000000000]}, 0x2000000, 0x0, 0xff, 0x1}, 0x20) 03:09:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) r1 = accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0x3a5, 0x1, 0x6, 0x1ff, 0xe67}, 0xc) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000180)=0x4) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'ip6_vti0\x00', @ifru_map={0x8, 0x6, 0x3, 0xfffffffffffff001, 0x7ff, 0x6}}}) 03:09:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x3, 0x6) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x48}, 0x1}, 0x0) 03:09:35 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x6, 0x40) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup3(r0, r0, 0x80000) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000001300)={0x7, {{0xa, 0x4e21, 0xe141, @empty, 0x3}}, 0x1, 0x2, [{{0xa, 0x4e24, 0x296, @remote={0xfe, 0x80, [], 0xbb}, 0x8001}}, {{0xa, 0x4e20, 0x100000001, @remote={0xfe, 0x80, [], 0xbb}, 0xa7}}]}, 0x190) fallocate(r2, 0x40, 0x7fff, 0x80) getsockopt$inet_dccp_int(r2, 0x21, 0x15, &(0x7f0000000080), &(0x7f0000000100)=0x4) fstatfs(r2, &(0x7f00000014c0)=""/112) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0x1000, "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"}, &(0x7f0000001200)=0x1008) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000001240)={r3, @in6={{0xa, 0x4e24, 0xfffffffffffffffe, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x3f}}, 0xfffffffffffffffe, 0x100000001, 0x9, 0x3, 0x8}, 0x98) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000001540)={0xd, 0x7, 0x0, 0x4, 0x4, 0xffffffffffffff9c, 0xf3}, 0x2c) sendto$inet6(r2, &(0x7f0000000140)="04010000008b00ddb8460900ffb25b4802938207d9033780398d5375a41640939029ef0712f295136f8f6575eb353c70e475f7fd54482c03ac4db09698c0e2d2000011000000fffba371917c4d7e45b6bb8d8111cf", 0x55, 0x0, &(0x7f00000000c0)={0xa, 0x200000803, 0x100080005, @mcast1={0xff, 0x1, [], 0x1}, 0x20}, 0x1c) 03:09:35 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000001c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000d40)=""/4096, 0x1000}], 0x1, &(0x7f0000000480)=""/92, 0x5c}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x0, @dev={0xac, 0x14, 0x14, 0xd}, 0x4e21, 0x1, 'fo\x00', 0x8, 0x0, 0x3c}, 0x2c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x34, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000240)="ca0e8f9df397eacd8faed8c43017f4f2bef4c3796752934937043406fa92dc4da27428aeda5d256fcb78c595f8ba86d7a78ccb9081fd7e348409991861246b6990722a669917dc427371ea157290c68adbbb54ee22cdeaf715b76d2195a3cae9aab231119985bbe443a5c48ef052b9646707f5d48fd2e018fa9a891883b0f01959e991c2ef77ca008c1b697355bd9abd21f6ccb886191dae38ba54c26faf196b5d6459f048eebb23aae0d8a29a4a6e6787c9a089fc62d7c44477adb2680e9d8f3e883d8c6304511ea581897f8a0411f2f6654f2774556f228a41efa5f3f49f1176") ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000340)={0x6, 0x3, 0x5, 'queue0\x00', 0x2}) ioctl$int_out(r1, 0x5462, &(0x7f00000000c0)) 03:09:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x10, 0x208, 0x93e8, 0x80000001, 0x0}, &(0x7f0000000140)=0x387) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x7e00000000000000, 0x8000, 0x2, 0x0, r1}, &(0x7f0000000100)=0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r4, 0x8000000000000007, &(0x7f0000000000)) sched_getscheduler(0x0) fcntl$lock(r4, 0x26, &(0x7f000001d000)={0x8000000000000001, 0x0, 0x0, 0x4}) socketpair(0x13, 0x1, 0x100000001, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000240)={r2, 0x7ff, 0x4}, 0x8) dup3(r3, r4, 0x0) 03:09:35 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)=0x7ff, 0x4) r1 = dup2(r0, r0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000000c0)={{0x2, 0x6, 0x8, 0x7, 'syz0\x00', 0x6}, 0x1, [0x2d2, 0xfffffffffffeffff, 0x1, 0x6, 0x6b, 0x3ff, 0x80, 0x3d, 0x8, 0x6, 0x2, 0x2614, 0x9, 0x400, 0x3f, 0x4, 0x2a, 0x4, 0x4, 0x1, 0x10001, 0x7ed, 0xff, 0x1, 0x8, 0x40, 0x9, 0x8000, 0x7fffffff, 0x2, 0x1, 0x1, 0x2, 0x7f, 0x8000, 0x401, 0x95b, 0x5, 0x6, 0x100000001, 0x20, 0x5, 0x2cc, 0x9, 0x233e, 0x8, 0x6, 0x400, 0x0, 0x7fffffff, 0x1f, 0x8000, 0x8001, 0x9, 0x10001, 0x6, 0x4, 0x8, 0x1, 0x6, 0xba, 0x8, 0x7fff, 0x8001, 0x9, 0x1, 0x7, 0x8, 0x7, 0x9, 0x200, 0x6, 0x1f, 0x7, 0x9b, 0x58, 0xfffffffffffffffb, 0x3, 0xffffffffffffffe3, 0x1000, 0x7f, 0xff, 0x3, 0x9, 0x544, 0xfffffffffffffffa, 0x0, 0x59a, 0x4, 0x5, 0x6, 0x6, 0x9, 0x101, 0x7ff, 0x81, 0x8, 0x0, 0x2, 0x6, 0x4, 0x0, 0x6, 0x1, 0x6, 0x0, 0xffff, 0xf8e, 0x0, 0xfff, 0x1, 0x80, 0x5, 0x7, 0x5, 0x7, 0x1, 0x101, 0x6, 0x7, 0xffffffff80000000, 0x4, 0x101, 0x3, 0x9, 0xe7f, 0x7, 0xfffffffffffffffe], {r2, r3+10000000}}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000005c0)=0x9, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000600)=[@in6={0xa, 0x4e23, 0x80, @ipv4={[], [0xff, 0xff], @rand_addr=0x9}, 0x3ff}, @in6={0xa, 0x4e21, 0x1000, @empty, 0x2}, @in6={0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0x17}, 0x8}, @in6={0xa, 0x4e21, 0x6, @loopback={0x0, 0x1}, 0xfb2a}, @in6={0xa, 0x4e23, 0x2, @loopback={0x0, 0x1}, 0x53}, @in={0x2, 0x4e20}, @in={0x2, 0x4e21}, @in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}], 0xbc) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000006c0)={'security\x00'}, &(0x7f0000000740)=0x54) r4 = userfaultfd(0x80800) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000780)='security\x00') getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000007c0)=""/183, &(0x7f0000000880)=0xb7) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f00000008c0)) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000900)={0x0, 0x10000000000}, &(0x7f0000000940)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000980)={r5, 0x6, 0x1ff, 0x8001, 0x577, 0x8}, &(0x7f00000009c0)=0x14) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000a00)={@in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}}, 0xf43b311, 0x5, 0x1ff, "c22fd1d719f39d62c3e1f6a96c353ca37a2653173595dae9b3f7ec51a42748e34dc95fbe365c7bd9dbfbc1d0ffd0f95bffd10ccd44971c6b964a2f8f634b6b63be0681857dd399eaa6566c05e5272199"}, 0xd8) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, &(0x7f0000000b40)) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000c40)) ioctl$FICLONE(r4, 0x40049409, r1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000c80)=[@in6={0xa, 0x4e20, 0xbd0b, @local={0xfe, 0x80, [], 0xaa}, 0x2}], 0x1c) sendmsg$alg(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000cc0)="a22e1c4179b40d846735f3c89862af1a115a9665c398be7b1b0d5674aa56fb0621b92d9c78a1da2b1780bb0c5268c3da79b445ca1b365ca2926bfcafb6a887d99367ec884d1434efb448290fc26ead3f46c42e3f90eb0442be57e3ed56cd6b031a5ae883b2e3735212a8f8566f2b33c2b91dd78c7d34e69e0578555566f30b2e16d792ff77da57cc614a05790eac768f4967bffc63e280074c5bd7f77c00ee0642696071620711cd6a27324a2cf45e4c7a67eed8", 0xb4}, {&(0x7f0000000d80)="776d141414716c6984307c49ba88c2b3a850e118af2effd2cdb2a49e4d933465572eea3835a20504c9b3b01b17e962f254e4852c9d50686011312c2273de26ea891985223dfb4aa8af3385f437", 0x4d}, {&(0x7f0000000e00)="32ea3f459eefb70c5b6c0c1e75eac19127161c3bda9c19ffae5f76b0c7cc97c5c79a0ef520313d5d2a884420a74d5e4612aa628ced83fe8032f38ac9909d7e3e5102ac9426560df36ea966755420257ce04a69e337edf43a3cb62e1e34824a108a2e8de217caa2deb786e834672d", 0x6e}], 0x3, &(0x7f0000000ec0)=[@iv={0xd8, 0x117, 0x2, 0xc1, "7a92a783004d956480a691cce0f1daccf10098486a6298ddd582b6ba479b1bfaa93f1371dafde20fb6f9026dbd0909186cacb31e8bcdb93ece8565dfcf852e5c7d1b0d336ea1a7db0fa939c5f2c4eada31f60bbedea1a528aba29dd2bd578d9203d80501d3271bb1006efd0cca90e13009e5f906a2d6fd25b38228e42efa0fc07bd05b2db3b3cc75f032a4f95bfa8374bfdc8e43e071c9486a7dcf457c715b1ebafe43785dbbc201c39b662231d0b47fdab6c15e0bf34d0d0c5e163650970e68eb"}, @op={0x18, 0x117, 0x3}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x138}, 0x20000004) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001040)=@assoc_value={r6, 0x40}, &(0x7f0000001080)=0x8) ioctl$RTC_PIE_OFF(r1, 0x7006) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000010c0)={r6, 0xec, "42369ff9ebc4270f19c570ac033c936c37edb04ef0f13c2b45c10a04cf7c8ad042d24ed5df873c28d3e5389358c24bc76f509a0aecf7d1d499b70818c243d7410575717c5ea26360f9e635b6f9d962f052864b71b2e9d0bbff3da114ac1424efdc095214ad49b66519c06a61ee4a982e8ce1dd760691dd408e14f48aec3fc879e8ae1a8822110046ddde0b7546d3689888d44dfaac65a24592250592f825c13d37692d434a2b6d669f102f9a8788fe9eb71059c762d4a6fe2923477929a47c9495897a4666dd061014155d3273699a1df1f3e88503a32b991162bfd00e6a0d47391b60bd7c0d2940c17f5327"}, &(0x7f00000011c0)=0xf4) connect$pppoe(r1, &(0x7f0000001200)={0x18, 0x0, {0x3, @random="ddfc69cd77e9", 'syzkaller0\x00'}}, 0x1e) write$P9_RCLUNK(r1, &(0x7f0000001240)={0x7, 0x79, 0x2}, 0x7) setsockopt$inet_int(r0, 0x0, 0x9, &(0x7f0000001280)=0x1, 0x4) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) 03:09:35 executing program 7: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000016c0), &(0x7f0000000000)=0x60) fsetxattr(r0, &(0x7f0000000080)=@random={'osx.', '+-'}, &(0x7f0000000200)="ca33552a28382e2ce8e36c568d294647dca32b5777baf9e95537f0e63cd68d32c9db7d95f93b2fcfeb2b86e4b49f4b6634a0a3091654d044f2fb7894d21f0d37379808", 0x404, 0x1) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x2) 03:09:35 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40002, 0x0) ioctl$int_in(r0, 0x80000080044dfa, &(0x7f0000000280)=0x3) r1 = fcntl$getown(r0, 0x9) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000001c0)={0x2, 0x7}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x9, 0x0, 0x0, 0x3, 'syz1\x00', 0x3}, 0x5, 0x2, 0x7, r1, 0x1, 0x8, 'syz0\x00', &(0x7f0000000000)=[',\x00'], 0x2, [], [0xb, 0x8, 0x1, 0x90000000000000]}) 03:09:35 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x4}, 0x4) getsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 03:09:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x1012, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005fd4), 0x116, 0x0, &(0x7f0000000540)="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"}) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x14, 0x0, &(0x7f0000000200)=[@increfs_done={0x40106308, r3}], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000003c0)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x8, &(0x7f0000000080)=[@fda={0x66646185}, @fd={0x66642a85}, @flat={0x73622a85, 0x0, r3}], &(0x7f0000000240)=[0x38]}}}], 0x0, 0x0, &(0x7f0000000480)}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000300)={0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000500)={0x14, 0x0, &(0x7f0000000340)=[@increfs_done={0x40106308, r4}], 0x0, 0x0, &(0x7f0000000440)}) 03:09:35 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) io_setup(0x7, &(0x7f00000012c0)=0x0) io_getevents(r1, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], &(0x7f00005cfff0)={0x77359400}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x28200, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) read(r0, &(0x7f0000000100)=""/158, 0x9e) ioctl$int_in(r0, 0x80000000005000, &(0x7f00000000c0)) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000280)) 03:09:35 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000c00)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001940)=[{0x0, 0x0, &(0x7f0000000b80), 0x0, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000001200)={&(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @hyper}, 0x10, &(0x7f00000011c0)=[{&(0x7f0000001140)=""/78, 0x4e}], 0x1}, 0x0) r2 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0x80000000, 0x8, 0x3, 0x1}, {0x80000000, 0x80000001, 0x9, 0x7}, {0x0, 0x7, 0x96e, 0x4}, {0x862c, 0x0, 0xc2c, 0x2}, {0xffff, 0x9, 0x40, 0xa59}, {0x2, 0x9, 0x43f, 0x5}, {0xfffffffffffffeff, 0x8, 0xfa, 0x9}]}, 0x10) 03:09:35 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = dup(0xffffffffffffffff) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40000, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x10200, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000080)=0x3, 0x8) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x84) 03:09:35 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = memfd_create(&(0x7f0000000040)='\x00', 0x3) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r1, &(0x7f0000000140)="0451d3acf972caf406e4068ab316a7d4a553f1ebceb5d44ac7a53eb5f8e9b0c80ecd2ef07a2c1190586d5e1b2d286af86305da3fff6943bfcfabc5f4f3c30f1a9c4594f5e18929c9ed10f016a4fd3a31ad998f93922c9c528d4de72ff7c2ea86b7c4163d6b006b66dc6ed49d1cf92b68b80784b116fc9d60fa5a81520875743865f864f0b62efa3353f743b90eb82cf7dd5af98036c9", &(0x7f0000000240)=""/204}, 0x18) r2 = socket$inet(0x2, 0x805, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x7}, 0x8) listen(r0, 0x6) sendto$inet(r2, &(0x7f00000003c0)="f1", 0x1, 0x0, &(0x7f0000000380)={0x2, 0x4e27, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x283) 03:09:35 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='usrjquota=']) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='com.apple.FinderInfo\x00') 03:09:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000640)=""/4096, 0x4000, 0x800, 0xee}, 0x18) [ 238.592434] binder: 10992:10994 BC_INCREFS_DONE u0000000020ffa000 no match 03:09:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='/%-!\x00'}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000000200)=0x9, 0x4) socket$key(0xf, 0x3, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) getrandom(&(0x7f00000000c0)=""/60, 0x3c, 0x3) 03:09:35 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000940)=[{{&(0x7f0000000240)=@nfc_llcp, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000580)=""/159, 0x9f}}, {{&(0x7f0000000640)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000800)=""/209, 0xd1}], 0x1}}], 0x2, 0x10000, &(0x7f00000009c0)={0x77359400}) r3 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) 03:09:35 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/route\x00') getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x7}, &(0x7f0000000100)=0x8) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000440)={0x303, 0x33}, 0x2) sendto(r0, &(0x7f00000002c0)="5a35d583468772a5e436f2031fa97736b7523b41dc41a13abfa710760d6748b9c8663b9951a07cc65ab44eb82c5396af86eab6c0d255744aec6015936863ce0cb506e75ca1bb0672402b8d29e6f625cc9ed79c21001fda0544156c0e8d8b8944a3d70e7594ce6851194921cbf5", 0x6d, 0x8001, &(0x7f0000000340)=@ipx={0x4, 0x9, 0x5, "dcf4b53cb24d", 0x85}, 0x80) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={r2, @in={{0x2, 0x4e20, @broadcast=0xffffffff}}}, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) [ 238.677643] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 238.728747] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 2530879793048935964 transid 756082810144684242 /dev/loop3 [ 238.761227] device team0 entered promiscuous mode [ 238.766423] device team_slave_0 entered promiscuous mode [ 238.772726] device team_slave_1 entered promiscuous mode [ 238.782187] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 238.821228] device team0 left promiscuous mode [ 238.826456] device team_slave_0 left promiscuous mode 03:09:35 executing program 4: sync() r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000080)={0x80}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x24) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x3, 0xbb2, 0x9, {r2, r3+10000000}, 0x20, 0x9}) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f00000001c0)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000200)=0x8, 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x10000000}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r5 = getegid() fchown(r0, r4, r5) r6 = getpid() write$cgroup_pid(r1, &(0x7f00000003c0)=r6, 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) write$vnet(r1, &(0x7f0000000580)={0x1, {&(0x7f0000000400)=""/98, 0x62, &(0x7f0000000480)=""/196, 0x3, 0x2}}, 0x68) fchmod(r1, 0x4) sendmsg$rds(r0, &(0x7f0000000c40)={&(0x7f0000000600)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000640)=""/243, 0xf3}, {&(0x7f0000000740)=""/20, 0x14}, {&(0x7f0000000780)=""/240, 0xf0}, {&(0x7f0000000880)=""/13, 0xd}, {&(0x7f00000008c0)=""/36, 0x24}, {&(0x7f0000000900)=""/162, 0xa2}], 0x6, &(0x7f0000000b40)=[@fadd={0x58, 0x114, 0x6, {{0x100, 0x6}, &(0x7f0000000a40)=0xffffffffffffffff, &(0x7f0000000a80)=0x8, 0x8, 0x777a, 0x2, 0x5, 0xbc00ac6f40064c19, 0xfff}}, @fadd={0x58, 0x114, 0x6, {{0x6, 0x7}, &(0x7f0000000ac0)=0x5, &(0x7f0000000b00)=0x3, 0x79, 0x4, 0x2b, 0x6, 0x0, 0x401}}, @rdma_dest={0x18, 0x114, 0x2, {0x81, 0xfffffffffffffffc}}], 0xc8, 0x20040090}, 0x1) mknod(&(0x7f0000000c80)='./file0\x00', 0x2, 0xffff) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/null\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000d00)={0x0, 0xffff}, &(0x7f0000000d40)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f0000000d80)={r8, @in6={{0xa, 0x4e24, 0x401, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x5}}, 0x7ff, 0xd780, 0x6, 0x5, 0x7fffffff}, &(0x7f0000000e40)=0x98) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$KVM_IRQ_LINE(r9, 0x4008ae61, &(0x7f0000000ec0)={0x7, 0x9}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) mkdirat(r9, &(0x7f0000000f80)='./file0\x00', 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r9, 0x8008ae9d, &(0x7f0000000fc0)=""/49) accept4$inet6(r0, 0x0, &(0x7f0000001000), 0x80800) [ 238.832396] device team_slave_1 left promiscuous mode [ 238.856935] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 238.864398] BTRFS error (device loop3): superblock checksum mismatch [ 238.868273] device team0 entered promiscuous mode [ 238.875969] device team_slave_0 entered promiscuous mode [ 238.881703] device team_slave_1 entered promiscuous mode [ 238.892556] device team0 left promiscuous mode [ 238.897309] device team_slave_0 left promiscuous mode [ 238.898403] BTRFS error (device loop3): open_ctree failed [ 238.902681] device team_slave_1 left promiscuous mode [ 238.991723] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 238.999078] BTRFS error (device loop3): superblock checksum mismatch [ 239.007706] BTRFS error (device loop3): open_ctree failed 03:09:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000200)='+systemcgroupcgroup!proc(posix_acl_access+selftrusted\x00', r0}, 0x10) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000000c0)=""/185) 03:09:36 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r2, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000014c0)={0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000016c0)=0xe8) connect$packet(r4, &(0x7f0000001700)={0x11, 0x4, r5, 0x1, 0x9000000000000000, 0x6, @random="eb657b819174"}, 0x14) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_stats={0x2}}) close(r3) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) close(r1) 03:09:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x10, 0x208, 0x93e8, 0x80000001, 0x0}, &(0x7f0000000140)=0x387) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x7e00000000000000, 0x8000, 0x2, 0x0, r1}, &(0x7f0000000100)=0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r4, 0x8000000000000007, &(0x7f0000000000)) sched_getscheduler(0x0) fcntl$lock(r4, 0x26, &(0x7f000001d000)={0x8000000000000001, 0x0, 0x0, 0x4}) socketpair(0x13, 0x1, 0x100000001, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000240)={r2, 0x7ff, 0x4}, 0x8) dup3(r3, r4, 0x0) 03:09:36 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x40002, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000002c0)={r1, 0x10000}, 0x8) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180), 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100), r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 03:09:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$TCSETA(0xffffffffffffffff, 0x4030582a, &(0x7f0000760000)) syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x400) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xa, 0x0, 0xffffffffffffffff}) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x301000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) r5 = getuid() getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e23, 0x101, @mcast2={0xff, 0x2, [], 0x1}, 0x10}}, 0x401, 0x6, 0x9, 0x5, 0xfffffffffffffff7}, &(0x7f00000004c0)=0x98) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={r6, 0x2}, 0x8) r7 = getegid() sendmsg$unix(r3, &(0x7f0000000380)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="10928c8be50da671fbfa0df8ac28b5274417894a4eec58ba9200d40767dc590f183e2923896dfa1d90a53aa052df71671cf3b2108a94c0f76d6f57b981a747d7dd3291a2fbf06ceadcd74f2ecb3ee8a55dc0b9f63a31c6afddab6edbf46858e07a501e178a21fd164fda", 0x6a}, {&(0x7f0000000140)="b7a34789d99c9b3322c8501354717d9bcca2038fb347e1c8e1ee55847790d5694a42944d8a39e8ea00ee20fe9af35c8e74f90e", 0x33}], 0x2, &(0x7f00000002c0)=[@rights={0x28, 0x1, 0x1, [r1, r2, r2, r0, r1, r0]}, @rights={0x28, 0x1, 0x1, [r1, r0, r1, r2, r0]}, @rights={0x20, 0x1, 0x1, [r2, r0, r2]}, @cred={0x20, 0x1, 0x2, r4, r5, r7}], 0x90, 0x804}, 0x400c011) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x2013, r2, 0x0) [ 239.375347] binder: 10992:11067 got reply transaction with no transaction stack [ 239.382934] binder: 10992:11067 transaction failed 29201/-71, size 80-8 line 2759 [ 239.512603] binder_alloc: binder_alloc_mmap_handler: 10992 20001000-20004000 already mapped failed -16 [ 239.528710] binder: BINDER_SET_CONTEXT_MGR already set [ 239.534212] binder: 10992:11067 ioctl 40046207 0 returned -16 [ 239.538454] binder: 10992:11070 BC_INCREFS_DONE u0000000020ffa000 no match [ 239.540409] binder: 10992:11071 got reply transaction with no transaction stack [ 239.554843] binder: 10992:11071 transaction failed 29201/-71, size 80-8 line 2759 [ 239.567544] binder: 10992:11070 BC_INCREFS_DONE u0000000000000000 no match 03:09:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4, 0x101000) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000140)={0x4}, 0x1) r2 = socket$inet6(0xa, 0x6, 0x4000000000000005) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0xd}) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000080)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0xe85d, 0x0, 0x9, 0x3, 0xa4, 0x9, 0x3, 0xf4e9, 0xe869, 0x0, 0x8, 0x9}) 03:09:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000640)=""/4096, 0x4000, 0x800, 0xee}, 0x18) 03:09:36 executing program 6: r0 = socket$inet6(0xa, 0x802, 0x1) setsockopt$inet6_udp_int(r0, 0x11, 0x7, &(0x7f0000000000)=0xffffffffffffffff, 0x4) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000a34000)=@in={0x2, 0x4e23}, 0x10, &(0x7f0000000740)}, 0x0) 03:09:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000300)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75c01f0200f58d26d7a071fb35331ce39c5aeeff5083cf07dd46455c914d4aff1e7cf7ed57c0c2056f5ca933f03cbf82bd13534737339245d31b0041be6281d7e1b4b7099114c571872298dd7f2120e2b6fa2a2e2a2c9c6e0034750b7961fa2c1584c0b5a500ae0ac39bc76a78d9158266759f766a3e8c84c09cf35a214a200421dcbc4cb6ee55476d8ead8882947ffa1fb4c050727beb12c57e06ff59") mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000180)=ANY=[]) ioctl$SG_GET_NUM_WAITING(r0, 0x40086607, &(0x7f00000001c0)) 03:09:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80, 0x0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000001c0)={0x2, 0x0, [0xc0000102]}) [ 239.678109] binder: undelivered TRANSACTION_ERROR: 29201 [ 239.683713] binder: undelivered TRANSACTION_ERROR: 29201 03:09:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="5a1606d3d72c70330ed87cd5459c05dd", 0x10}], 0x1, 0x0, 0x52b}, 0x8088) sendmsg$alg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/92, 0x200002dc}], 0x1, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) 03:09:36 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r1, r1) r2 = msgget$private(0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000000)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000000c0)) ioctl$TIOCCONS(r3, 0x541d) [ 239.760094] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 239.767363] BTRFS error (device loop3): superblock checksum mismatch [ 239.796733] BTRFS error (device loop3): open_ctree failed 03:09:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) mkdir(&(0x7f0000c92000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r3 = open$dir(&(0x7f0000000180)='./file0/bus\x00', 0x0, 0x0) writev(r2, &(0x7f00002c8000)=[{&(0x7f00007fbf5f)="b7", 0x1}], 0x1) r4 = dup(r1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x2011, r4, 0x0) sendto$inet(r1, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r1, 0x1) fcntl$setstatus(r3, 0x4, 0x800) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0/bus\x00', 0x10000, 0x1, &(0x7f00000000c0)=[{&(0x7f00000001c0)="6dc90575fd1076ad81ffcff78cd91fc87173458726c4eced2554661abb11d92d0f89a39c01f4f6b9c0103e4ba5738d8ba1e5134f8d26aa8b2911fb9e34fbbdaafd81b0d9f8e45567f52c6576dee3b8bd885b113d98f2f233373c0e6d75ef5a0f0e06084a1fa23133c1d5ed8cf52f7e50329099ab0bf1542d24cbcc4e742d5740245c52c7063589650b3fe10e84a9fec2c1d15177141fb16b712a36d8146f472d8eb289b53f9801d71735ce68f7ce8656157c000e6610725b68b65f162b1638d2cba7d54f34d4386a85739254c5f491e1ed2338bee7347eca935862172fa4e50a86ed06d9", 0xe4, 0x4}], 0x10, &(0x7f0000000140)={[{@suiddir='suiddir', 0x2c}]}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6c, &(0x7f0000018000)={0x0, @in6={{0xa}}}, &(0x7f0000000000)=0x8c) 03:09:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000640)=""/4096, 0x4000, 0x800, 0xee}, 0x18) 03:09:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r1, &(0x7f0000465f8e)=""/114, 0x47) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40082406, &(0x7f0000000040)) close(r1) r3 = getpgrp(0x0) syz_open_procfs(r3, &(0x7f0000000000)='net\x00') ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000c22ff0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 03:09:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x20000, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x40800, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',pos|xacl,cache=loose,mmap,\x00']) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r2 = socket(0x10, 0x2, 0xd) r3 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x2000, 0x0) sendfile(r2, r3, &(0x7f00000000c0), 0x80000002) 03:09:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1_mb\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000180)=0x3d6, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') r3 = syz_open_dev$sndctrl(&(0x7f0000002340)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x81785501, &(0x7f0000001000)) sendfile(r1, r2, &(0x7f0000000080), 0x10000000000443) [ 240.023523] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 240.030950] BTRFS error (device loop3): superblock checksum mismatch [ 240.052545] BTRFS error (device loop3): open_ctree failed 03:09:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000640)=""/4096, 0x4000, 0x800, 0xee}, 0x18) 03:09:36 executing program 0: prctl$setname(0xf, &(0x7f0000000100)='"') seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0xc6, 0x1, 0x1, 0xfffffffffffffa8a, "ad7b6a2639989f3fae0fc20c2cf231da646ac0357e7f9f05942a69ac42cf037d17ba106e6bb5849a1b042f99", 0x5}) r1 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x0, &(0x7f0000000240)="af26262c8523bf012cf66f") bind$inet6(r1, &(0x7f000044f000)={0xa}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}}, &(0x7f00000002c0)={0x0, 0x8000000000001}) syz_open_pts(r0, 0x100) 03:09:36 executing program 6: r0 = socket$inet6(0xa, 0x2002, 0x400000000000000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000fb8000)=@generic={0x20000000001e, "01030000000000ff00000000ff03000009bf79df21d60c7bc8790405c7bad62e0a53a632ed4938f50006fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f183bea5bdb9c8ead2000077aeb81c90001d6d5e980ee590c8b9f70dc136cb184a"}, 0x80) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) dup3(r1, r2, 0x0) 03:09:36 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) connect$vsock_dgram(r1, &(0x7f0000000000)={0x28, 0x0, 0x2711, @reserved=0x1}, 0x10) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)={r0, r2}) 03:09:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x10, 0x208, 0x93e8, 0x80000001, 0x0}, &(0x7f0000000140)=0x387) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x7e00000000000000, 0x8000, 0x2, 0x0, r1}, &(0x7f0000000100)=0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r4, 0x8000000000000007, &(0x7f0000000000)) sched_getscheduler(0x0) fcntl$lock(r4, 0x26, &(0x7f000001d000)={0x8000000000000001, 0x0, 0x0, 0x4}) socketpair(0x13, 0x1, 0x100000001, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000240)={r2, 0x7ff, 0x4}, 0x8) dup3(r3, r4, 0x0) 03:09:36 executing program 7: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x2, 0x4) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000a80)=0x1, 0x4) r1 = msgget(0x2, 0x4) msgsnd(r1, &(0x7f0000000880)={0x0, "7b997ed96fc3e5dabe5002d52899b7ba59e062681ad5a35b47db167e403f982ebda4c32cfa5dfc5a81a1ad3ccab4fbef98e45453f05743b070a58fefeb1c06a802fbb95a16745454b5024a57a26559952a2fceadadb6e27dd7dbcc9daff23610ada1ff96f185186f681f5422b156dda277a4647c40402e20d5762158cf561fe2f4948f7eb1b39f16dbe032e534f3440aa8851ef1325a6497f08e6b951cf6ade773cc7c5f1aaf949dc805fbd84b7738a036f95c217fbcd8cbbd40b1"}, 0xc3, 0x800) socket$bt_hidp(0x1f, 0x3, 0x6) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000780)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000009c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000b00)=0x7, &(0x7f0000000b40)=0x2) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000a40)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000980)=0xff, r3, 0x0, 0x0, 0x1}}, 0x20) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) setreuid(r4, r5) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000600)={@local, @multicast1}, &(0x7f0000000ac0)=0xc) syz_open_dev$vcsa(&(0x7f0000000800)='/dev/vcsa#\x00', 0x3ff, 0x400000000400003) sendto$inet(r0, &(0x7f0000000000)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) [ 240.253018] audit: type=1326 audit(1531364976.965:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11149 comm=22 exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x50000 [ 240.272407] audit: type=1326 audit(1531364976.966:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11149 comm=22 exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x50000 [ 240.291127] audit: type=1326 audit(1531364976.966:7): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11149 comm=22 exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x50000 [ 240.310095] audit: type=1326 audit(1531364976.966:8): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11149 comm=22 exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x50000 [ 240.328641] audit: type=1326 audit(1531364976.966:9): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11149 comm=22 exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x50000 03:09:37 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xfffffffffffff801) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_misc(r2, &(0x7f00000001c0)=ANY=[@ANYRES64], 0x8) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r1) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x4) accept4(r0, 0x0, &(0x7f0000000180), 0x0) [ 240.347193] audit: type=1326 audit(1531364976.967:10): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11149 comm=22 exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x50000 [ 240.365827] audit: type=1326 audit(1531364976.967:11): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11149 comm=22 exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x50000 [ 240.384482] audit: type=1326 audit(1531364976.967:12): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11149 comm=22 exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x50000 03:09:37 executing program 7: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) write(r1, &(0x7f0000000040), 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r0, 0x1000000000016) [ 240.403136] audit: type=1326 audit(1531364976.967:13): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11149 comm=22 exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x50000 [ 240.421772] audit: type=1326 audit(1531364976.967:14): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11149 comm=22 exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x50000 [ 240.455808] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 240.463072] BTRFS error (device loop3): superblock checksum mismatch [ 240.504362] BTRFS error (device loop3): open_ctree failed 03:09:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) 03:09:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="8191c73807b8bc1466811acbc9fa468cf4a4d5aa37dc496138cfce1bc6b9d5b8e93f1659392b16d717b0dd253e239de85405a3aee6362ab99ab2cabd3312f3f821b220cb397613eed19d2fae38455e0004b73c49bf22ce05a16e221c1dcc9a1fecc591a01d871a49bb116764c340a2df58b29bc9bee7cc2a1900a3b0b50840d89131ed5fc7f0a8d1ec0f1f623397ce5b09e0aabb6763dc362043d85d626a368e5b838a9b6de575dbeaa2c0cedbcff7f8a10801899734", 0xb6, 0x3}, {&(0x7f0000000200)="6832db669aedd0cb41e063b594ba19436d31c417177e5e2a5eb123e882ceef87169d25c9b48363e827", 0x29, 0x200}], 0x200800, &(0x7f0000000280)=ANY=[@ANYBLOB="cc4573655f73656e7369746976653d7965732c00"]) timerfd_gettime(r1, &(0x7f0000000340)) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3000009, 0x150, r0, 0x0) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000480)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c0000001800fdff00fd0000000000000100000008000100", @ANYRES32], 0x1c}, 0x1}, 0x0) [ 240.655535] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 240.662831] BTRFS error (device loop3): superblock checksum mismatch 03:09:37 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f0000000000)=0x7fffffff, 0x4) [ 240.717958] BTRFS error (device loop3): open_ctree failed 03:09:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) socketpair(0xa, 0x1, 0xc2e, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000180)=""/63) recvmsg(r1, &(0x7f0000003700)={&(0x7f0000000100)=@ax25, 0x80, &(0x7f00000035c0)=[{&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/47, 0x2f}], 0x2, &(0x7f0000003640)=""/186, 0xba}, 0x0) 03:09:37 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) rmdir(&(0x7f0000000680)='./file0/file1\x00') r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10040, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b80)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000002c80)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000004340)=0x14) sendmmsg(r0, &(0x7f0000005a80)=[{{&(0x7f0000000100)=@in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000002c0)="11c544da646c097650d7d1bce44fc89b0c53b0eeebcedb7f770ade2f7b3a7f66194682f1f6e759a04b32c495d2059124b1245d4ab4413f1265c828e91119e02d6006a4b4e9e132aa98c41dd2192c5f7d36c55d3412db2809cfdc1ecb1389c36efa1c0537adfc5dc7629b2e25d8a7bae5252493b55a785166a08df08d06638667d4da336a9b3df42535f7624c0c9d41f1c5f2fd66a0fc84accb878aa0f7bb243a8ad8956596908df7f7e6c29d493f32debbb15f5edd3accdf20b62af2799c8ed0c56b9f975364d1c2b1099e2a54e6359c9d87843d8e4fec0c75dac1387c9446af1f9f608c13fee345", 0xe8}], 0x1, 0x0, 0x0, 0x4}, 0x12b}, {{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x0, 0x1, 0x1, {0xa, 0x4e22, 0x1f, @loopback={0x0, 0x1}, 0x5}}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)="0792425593b13cc8f2b768bd8268e7ce13abed57ab92f78a8cd86009b38fa0a6579c6d5074d787e7a5a41c72ee3bdf8add9e8e62e1d71d34638091ba73107d1b49a1de4601f24623b409cfd94183dcf6c751f36d9d67e45f128670fe967ecfb4546e419c1666ac2c1d4b921b6b3a329ecd40358a742135b9bca42c0d5a373ff9296f", 0x82}, {&(0x7f0000000480)="c2c39a500e248a43d016c8d5c65f7d800562c12dc0fc8dc272d7ee6c97835da6f0ec0e5cdd995bd9f2dd0a1e9233eb64d1b6505190dfff2499e06a71c98e46b4a723a4d68682d59ba32de4927595c3d72e92f65938430414572ff5fb14db2336d899b523e869e6f8822164d0432244fac81c185f29651f29e95931056bf7e53a0ac9499e5be92182b4a3c80c0606abe32df3c2a69cfa48a1e8b0b131980466465b3f807f5a12913641770693b540ad32954e3bf3f11bf5f444aa1f2f5378aae113cfc3ec0fe2f79b99a28cb79bafbb25c9f2e82d7d5555029dd656e187ec0317cae71b259e25", 0xe6}], 0x2, &(0x7f00000006c0)=[{0x110, 0x1ff, 0x800, "4b77fbe7a93311e1c574082c254ac8bd976965ecfa7097add6872571f5ef708fab85a113babc397e269d1ab2ffde52f3ff5837d95b874b5103ce533b3eeaa75f83f8dd6238574cd63caa87af3ad7269503191f490db934637d7abc5d407623c4545174378d6f31261863ba3f4aa99189e5a18fd66fed1af5ab1bef96ad764a06e0bfcb7e05ab684b36daf9eb21d5c54c1a16849a96dd4881a1d6e2cb998338812878f0c8cba94c5e8b07c76dd9dd93550ba3d3fd2ac67248c5bce1fb1ea793f3ccf847654ee578a1e00500b0fd27698c62b448277b979faa6fcb83b12e24934add044ed606bbdae4e612d86a84a5698d7544aea9c171a8fefe2f9fc8c727"}], 0x110, 0x2baa1fd1cf9d01b0}, 0x7fff}, {{&(0x7f00000005c0)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000800)="19aa4193699bde6b58321d25a07dafc8a94debb7c282192308f819cec0ef25339982b432c1349b6e9d8687a597e31e3a8d6ddcb8e8950e6dfe98f114f1024a05beee330096dfeadce2e45dc859edc04ad225153c8341d457d7f8ba2f2db3dbd5922db64114e78b917ce5cccab450840dcda1cc087ef1459182ce573b474b5b74d956939f5492cfbea83e6c63cb573d790fb02bf9ce4400a683be25e28f62a05ff662d4f16f79427c6db24eafdc2ebd3f025fefebb538c6c0647dae0fddc109ee59e2029260719dbf12711af389cbf18027793b2b9af6c0324298ad58d42d88fb881cb63d6ef3bb", 0xe7}, {&(0x7f0000000900)="2a40ccbb8f357016ce5bdc27323567925abca310286f7f7db0471baaa76dc02896f1ed79890e188aa562dc4324c0a75d40609b7af67f4d9fff2f73a3c59ae30a241db8f4ab294cb4286a4ab3907ddc38ed14e66d7b395778e1ccdb036090f61632a9d2d9650b772b09b7f098ff45d6d6537b0b9fe012323fc296a5e808e3e81193323956cace8ed57080aa406c1e65ed03311ecd82a3c04bb7492b8c77cea7c9d91b2d77f2d20aaeb07c29a26db119cc6272d0e046139bb986d4f04d1fb93734f2ef4bfaf21ddfa9a0f45ed7100819ec5acd435af71e54ec79aaf5cb750345c60fe5f945b8baf50f2fa74ead77f6", 0xee}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000001a00)="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", 0x1000}], 0x4, 0x0, 0x0, 0x4000000}, 0x400}, {{&(0x7f0000002cc0)=@ll={0x11, 0x1d, r2, 0x1, 0x6, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f0000004000)=[{&(0x7f0000002d40)="660c1ee2d76cdad324b77ea241ca897ca99464103f318c4a9d0c03c94be3a16aef64fb4fa8ff5c0b3ed2ea71da2bacc7cf145e8ab5d6fc9b72ba845c6dbee4b17272ccb93497ac881354cabeb449c45e4f623e5f28d9fd0b23da6231b652bc06d9be828c26b30c7ffeba816dfea23bce679d87a8df8c5f14ab14dc033b4f88da8176e8e52cb08611470d6f927e7d3de49ff5398e749c563a038de1ffbc222959e28d661ee8d0f1667c7fb173e6ec867ada6c549b398842cba67a7ff826b4e4e153817cf6b786b3be03983d947082ba6fb110b041d4478b1aa80e99b3d2bc1479d5ead552b399b04d7b3246eb117a38fb1c6c3e8721", 0xf5}, {&(0x7f0000002e40)="80d9cd3b2516b70e05944eaa226ee5f27f120ffc62800ff6508f8f730047a88e1b04693ed44ae1bd877ee64da493b763da3031aa95c95b7a3b57a181d32fcdb3f5a17533b8e0a3841f186f5889b78a0596083ad2a73c9e1ab554ed6b246c54bbf1a6adad107c9c3831ea7922e4dadf0157ebc05a0c180c87e60c50cdb1e8b194dabd4c938a4d222580092e5c337503931989dbce64ef49e3d48949b5903050ed2e28c5e6118a4c97f99d32e9f86d09650d2c62f2e44610eaf8028c3a224910388ac3f9cab8eb3628b0c74745", 0xcc}, {&(0x7f0000002f40)="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", 0x1000}, {&(0x7f0000003f40)="b73460575125034da79eb7bbd5a26f5a132cc6a3b0e31b1e133e4ff340b9e0e879c7e192b357f41512ebc052ebd401399367eb33618d3bd3b5f15489d06f3975dc793958659124c6f8f353c1cc94a4d784fac0095909f5092ba8eebce5a0e1f03e75d19ec5b8189d5fcba63f9e4223bb1bccc8996f1186a27f0c0274efed1580416c721cffe6e022e08c905debcf0fd41e6eef4ffa9f380e0ea94660c8b3072b23a71357a911a1c2359a00351bda704559569c45fd917f151e", 0xb9}], 0x4, &(0x7f0000004040)=[{0x80, 0x11b, 0x0, "2b3d807f035528694ec678e8195c8153ed08d4453182c6bc5a1390fff3f7d626e8d1d15ac7e1c2c51e4ef3a26db1946bfecd941e8deafdd247526ac79dc945fcc78bea9e67d3203b5bb9a664c650dfda76c48d42e4a5a7690c3f357fce9095c15247c96b487affe92b1abae7166e8f64"}, {0x50, 0x115, 0x6, "9f3672e3ba353e5105d2997ffa0baceae9a4440846ea32af53b79ef7533e1e050ab48037e7e1dfbd2383bf8669671dc12728ba3b0a0a149d8ba76d12e22c1615"}, {0x58, 0x11d, 0x6, "410ad619b3bc7ac4bf182ac3e0940da4277de2d58e5d839bf0ada542deb75de316afc7d1bb311094a699f4158a96072282d08b1252cc4e832a5ef17d76ad45726bad0d"}, {0xd0, 0x0, 0x8, "968afcc7744a45e0f82dfcd8729d77a9715d714c96322783dc10ceeb9ca6282f3d110fe6e351879106142d763f3eab7971d993bd698f791e973008a33132363947a416b2d2a75a4d2847b761f384c738635a7aca34e762841f43d45edd4655d61b2dd7953784bf4caae6001cb9154737d079ec8b488ee849983ad59c687dd089a7c952372f6b043b0ea892b0e4a2ee85f527f80a7f05c1b6eecf9e4a2530d2fedd64a8ff3149b0747f1cd04df6ca678860a8a7a64a174977c1034b164afc"}], 0x1f8}, 0x8001}, {{&(0x7f0000004380)=@ethernet={0x306, @random="51e6a5811324"}, 0x80, &(0x7f0000005500)=[{&(0x7f0000004400)="cf6f5f4cd99257ae5123ee4b6afb24d86fcd8f2cd2e06a8b2e86dedec90dbeacad629068cc298ea65e1a3563994080303c0b81b8fe3f5c798995f4a98ad1947ed303859cdc430aae57683c7f978422852a4b275845398397691faf74dbf7ca7ba033e1b1b23a8e6f0d64784a8f73a9a99ba46ac7c9f9ba2917d5ddc4e7567bf669bd2fafa11db7ddf2f6e42a262dfe3e51fee94d33d422cd4b34ddb3558612dd379d28531b375dc805aef1d5cfca8bee82097471e4d22a9d90054ab48490468390f092ef9c1b78dc4dd31aec30c6e30e80e708", 0xd3}, {&(0x7f0000004500)="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", 0x1000}], 0x2, &(0x7f0000005540)=[{0x110, 0x3a, 0x7fffffff, "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"}, {0x88, 0x0, 0x401, "14c43ffee08cc603616ff60e2c4981fe17e9f0750f6e432b2cb9a69ae858318e496275148e8618f53f037c0045cc6cf87500118e32dcef567e2ac085da6ab4430f5ac57bfc33ce82920d62bb612f208912dcec6eaf194e3318c36778a47444adea4bbbcbaaffb3cbb27d40958c9573a4fd971e"}], 0x198, 0x4000}, 0xd063}, {{&(0x7f0000005700)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80, &(0x7f0000005a40)=[{&(0x7f0000005780)="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", 0xff}, {&(0x7f0000005880)}, {&(0x7f00000058c0)="8ef6e21623c779e60d3ed8b3dbef80f896f06db4d0d9bc58e761b0363c65805446d05104a3e9851e80325b730907c4fc1185878b59f765e59af9703c45275fedbc4fdd6bda4bcccd976b1cac2f019cff6a7de48c82d1392b0630c32df2b4f18bf6419a9e487e4c0b022843a17ab21d247e8b", 0x72}, {&(0x7f0000005940)="9f39e4e7c7d496cf031e7f9ea9a3bf47fb899772de9a53c55eadc7ad64b49e0877910e434b54a83faeb5a92f6a4bc2737b93d3f330918e2395446044af5b6eec325baeddd7c1b127239888baea48a1c0b551a26823e2bc1687ddbfd789412b4a8fcc1adfa200daad633edb17e656edd79b7f92972dc5f87be4fedf2542be0ba5f8c606ea4c9f27dbc5d9835c0d620696762246a54899f5d69d493aeda65d7874248583da162dc7eb8fc85d2f12e4238578375260cc2b0e9a82f8302a54fa9c0482e47e11b4f3d7580a276b86b7add16456b7f0c984354c79438be0c3fee1e3d252564b715f39ab1c97326fc56f90", 0xee}], 0x4, 0x0, 0x0, 0x4000010}, 0x6}], 0x6, 0x4000090) [ 240.814621] tmpfs: No value for mount option 'ÅDÚdl vP×ѼäOÈ› S°îëÎÛw [ 240.814621] Þ/{:fF‚ñöçY K2Ä•Ò‘$±$]J´A?eÈ(éà-`¤´éá2ª˜ÄÒ' 03:09:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={"7465616d300000163694d900", 0x0}) sendmsg$nl_route(r1, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=@setlink={0x30, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_XDP={0x4, 0x2b, [@nested={0xc, 0x1, [@typed={0x8, 0x0, @fd}]}]}]}, 0x30}, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x7fff, 0x8008, 0x8001, 0x81, 0x3, 0x8, 0x81, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={r3, 0xffffffff}, &(0x7f00000000c0)=0x8) 03:09:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x0, &(0x7f00000002c0)="025cc83d6d345f8f762070dd920b5c129ffdfb2f66ccf91612c1a3b2cbb70b9c8e3a5a008d51d39ef7448fc0494db5a30e233319c8949c109549764c9dbdb4178b7cbf7ed121a1b229904e59091d43a4f49e3474187e4269f20f562154e6402d521129dad395bc6602862614f36da644af0c7c5046d2a7edf2cf3a5697d3d9904cddd7b0bdc556b86001b39c2d64d6fd710459119f7d25bff34576f20c1603cc1e617318b08f9ed96d950ff119bde13cd0633e6e6d62c1d0708525d16de9f4f43e60dd9a1eca9b6fd64525b4d213a3a7") ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000001c0)={[{0x5}]}) r2 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)='/dev/kvm\x00', 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)=':!\x00') ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000840)) 03:09:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) write$binfmt_script(r2, &(0x7f0000000040)={'#! ', './file0', [{0x20, '+'}, {0x20, "656d31c32f2d"}], 0xa, "7dbf023d3c642251f9bd7024a2dac49bc4f0ea6f3dcdf949a803ce370d524ad8c88d8a8a2f1b74ed52d6d51fdc33c5fec31dd78c38cb1bf4f56a620d9a1311f8727b3b2a8f9808110e42ccfd"}, 0x60) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="a9"], 0x1) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r1, r0, 0x2, 0x0) dup2(r1, r3) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000100)=0x1) 03:09:37 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000004fc0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000004f80)={&(0x7f00000000c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000010000000800017dca20c5c3e764250c8908fc4d5e12394e61de23065be8778542230c4fbbdbeb21b58512ebf27924200321f9abf10c449410801a64411e3a74001b0cdb5100aef1e82854d2e810b7d59b79e93e6c", @ANYRES32=r2, @ANYBLOB="04000200"], 0x20}, 0x1}, 0x0) 03:09:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x2000000}, 0xc, &(0x7f0000006e40)={&(0x7f00000004c0)=@setlink={0x2c, 0x13, 0x309, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKMODE={0x8, 0x11}, @IFLA_IFALIASn={0x4, 0x14}]}, 0x2c}, 0x1}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f00000000c0)) 03:09:37 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x1, 0x8010, r0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r2, 0x4}, 0x8) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f00001ee000/0x4000)=nil, 0x4000}) write$binfmt_aout(r1, &(0x7f0000000140)={{0x10b, 0x100000001, 0x9, 0x2cc, 0x18e, 0x6, 0x24b, 0xf838}, "0978abde0a67ae1d6588ffd9384dba6a2ae15716ed935b5281d13b8ba5fbb7dcf6c5d032174e0d8caba478f6149846fc758a6a33d21d0398bdc59bb545f830c12809f47ec665dd78c1cafa4079499aaf03db0c0ab1d720b98d395ec8d389b5b54dfa5fb9631634645f144a2f926ed7abf5967b2b42e61ab747", [[], [], [], [], []]}, 0x599) [ 240.950680] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 240.982913] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 240.990215] BTRFS error (device loop3): superblock checksum mismatch 03:09:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x13, &(0x7f0000000080), &(0x7f0000000140)=0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) [ 241.039236] netlink: 'syz-executor5': attribute type 17 has an invalid length. [ 241.050352] BTRFS error (device loop3): open_ctree failed [ 241.056014] netlink: 'syz-executor5': attribute type 17 has an invalid length. 03:09:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x10, 0x208, 0x93e8, 0x80000001, 0x0}, &(0x7f0000000140)=0x387) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x7e00000000000000, 0x8000, 0x2, 0x0, r1}, &(0x7f0000000100)=0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r4, 0x8000000000000007, &(0x7f0000000000)) sched_getscheduler(0x0) fcntl$lock(r4, 0x26, &(0x7f000001d000)={0x8000000000000001, 0x0, 0x0, 0x4}) socketpair(0x13, 0x1, 0x100000001, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000000240)={r2, 0x7ff, 0x4}, 0x8) dup3(r3, r4, 0x0) 03:09:37 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, r1, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x80000) 03:09:38 executing program 7: r0 = socket$inet(0x10, 0x400000000000003, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f00000000c0)="1b0000001200030207fffd946fa283080700190000000000000085", 0x1b}], 0x1}, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000140)=""/92, &(0x7f00000001c0)=0x5c) recvfrom$inet(r0, &(0x7f0000000040)=""/113, 0x4ce, 0x0, &(0x7f0000000200)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x7091cb) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0xba, "4fe34c400f5a5068fa80db9ad73cb87dc52c0a1683d697352adb5d18b748ea2c9d5822f5a071840c8d27093c5a48c8c664d19d16a287a7630f3085fccf4d5cf29d7a3611ee583e8b5d2bc2ab923afb832d2f284b8bb9bc1423325e16674d9efd6dc8ea8cc85ed4d69fa07d5de6f077f57ceee8465735a2ffb25c8b5c84bb984f691f0046cb61588a889f996f2e49a641c44315ede42e412e800eb232bb336034cde24f59c825749b1847659812e7bbb46ac6196778e550de922c"}, &(0x7f0000000000)=0xde) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x602800, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000680)={0x0, 0x80}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000700)={r2, 0x2}, 0x8) 03:09:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000005e00)=[{{&(0x7f0000004800)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005d00)=[{&(0x7f0000004c80)=""/120, 0x78}], 0x1, &(0x7f0000005d80)=""/112, 0x70}}], 0x1, 0x0, &(0x7f0000005f40)) recvmsg(r1, &(0x7f0000001480)={0x0, 0x2fd, &(0x7f00000013c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, &(0x7f00000000c0)=""/123, 0x7b}, 0x0) 03:09:38 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3dfe6e42, 0x1) write$P9_RWALK(r1, &(0x7f0000000180)={0x30, 0x6f, 0x2, {0x3, [{0x20, 0x3, 0x4}, {0x10, 0x3, 0x1}, {0x0, 0x3, 0x6}]}}, 0x30) sendmsg$nl_crypto(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@delrng={0x10, 0x14, 0x205, 0x70bd2a, 0x25dfdbff, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x1, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1c}, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005200)=[{{&(0x7f0000004dc0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000005080), 0x0, &(0x7f00000050c0)}}], 0x1, 0x0) 03:09:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 241.401484] netlink: 'syz-executor7': attribute type 25 has an invalid length. [ 241.409133] netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. [ 241.422827] netlink: 'syz-executor7': attribute type 25 has an invalid length. [ 241.430318] netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. 03:09:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = semget(0x3, 0x0, 0x400) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f00000001c0)=""/73) ppoll(&(0x7f0000000000)=[{r0, 0x1}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080)={0x2}, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e63707500eac5bea7af575a45fddd5af3a7709295a69e7bc5fd0592bf2a4dc8ace908be8842141ca2a714ed0163d4afd8ac48123d4869e05556a93347d6a7430e03a5f2beb186f16bacf2e4dcdcf3b9ff1d99165ce38d996e7798fe471d9a0d81acd08788fcc9892a2487efcde7a649614b14ba1c18", 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r3, r3, &(0x7f00000000c0), 0x5) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r4, 0x4008ae48, &(0x7f0000000180)=0x100000) 03:09:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:38 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80400, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000400)=0xe8) getsockname$packet(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000540)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000740)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) accept$packet(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000980)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000009c0)={@mcast1, 0x0}, &(0x7f0000000a00)=0x14) clock_gettime(0x0, &(0x7f0000003980)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003840)=[{{&(0x7f0000000a40)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)=""/66, 0x42}, {&(0x7f0000000b40)=""/86, 0x56}], 0x2, &(0x7f0000000d80)=""/149, 0x95, 0x100}, 0xfffffffffffffffa}, {{&(0x7f0000000e40)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000ec0)=""/252, 0xfc}, {&(0x7f0000000c00)=""/35, 0x23}, {&(0x7f0000000fc0)=""/94, 0x5e}, {&(0x7f0000001040)=""/101, 0x65}], 0x4, &(0x7f00000010c0)=""/249, 0xf9, 0x5}, 0x2}, {{0x0, 0x0, &(0x7f0000002340)=[{&(0x7f00000011c0)=""/183, 0xb7}, {&(0x7f0000001280)=""/151, 0x97}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002500)=""/4096, 0x1000}], 0x4, &(0x7f0000002380)=""/72, 0x48, 0x38}}, {{&(0x7f0000002400)=@in6={0x0, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000035c0)=[{&(0x7f0000003500)=""/184, 0xb8}, {&(0x7f0000002480)=""/56, 0x38}], 0x2, &(0x7f0000003600)=""/18, 0x12, 0x9}, 0x6}, {{&(0x7f0000003640)=@alg, 0x80, &(0x7f0000003800)=[{&(0x7f00000036c0)=""/219, 0xdb}, {&(0x7f00000037c0)=""/30, 0x1e}], 0x2, 0x0, 0x0, 0x2}, 0x2}], 0x5, 0x20, &(0x7f00000039c0)={r9, r10+30000000}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000003c00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000003bc0)={&(0x7f0000003a00)={0x198, r2, 0x100, 0x70bd26, 0x25dfdbfc, {0x1}, [{{0x8, 0x1, r3}, {0x130, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r4}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4}}, {0x8, 0x6, r11}}}]}}]}, 0x198}, 0x1, 0x0, 0x0, 0x1}, 0x40084) bind$alg(r1, &(0x7f0000000480)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede-generic)\x00'}, 0x58) r12 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="d3ab27191a01002356ba602dff050022fef9b9afa4b20079", 0x18) sendmmsg$alg(r12, &(0x7f00000024c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000640)="bb51e44d8438b90ef5f9aa516235ff24af7473", 0x13}], 0x1, &(0x7f0000000780)}], 0x1, 0x0) recvmsg(r12, &(0x7f0000000d40)={&(0x7f0000000180)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000500)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 03:09:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:09:38 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0xf503}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000002700ffff0000000000fdffff150000000800010000000000"], 0x1c}, 0x1}, 0x0) 03:09:38 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x141000, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=@newpolicy={0x1fc, 0x13, 0x400, 0x70bd2c, 0x25dfdbfc, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@loopback={0x0, 0x1}, 0x4e24, 0x0, 0x4e22, 0x40, 0xa, 0x80, 0x20, 0x32, 0x0, r1}, {0x0, 0x7fff, 0x81, 0x1, 0x3f51, 0x3, 0x8000, 0xaeb8}, {0x2, 0x8, 0x0, 0x6}, 0x9, 0x6e6bbc, 0x2, 0x0, 0x1, 0x1}, [@algo_crypt={0xec, 0x2, {{'lrw(ctr(blowfish))\x00'}, 0x520, "05a0e66b65880b71bb63a9ac2798ff84ec7bab9105fb704b46f887742c8dc05668b43d5110f0da783ba692c16a21afa51059ffcc8f1c2f0fcd3491d2e308d3b78f3b24b0443b6a9f46f6bc485718f02b2fe8bed44e1f1b6c3764fb3f8f2026d0d232b5923ba037e7a60d2d3df2d2f0c3f7d10a16d41a677a5a33ca1c2526779c01f7aafd4eb6905670a2d7a6d69f7cec2cfa7a9a6bd6187a463d3d65ff0bb0f37101b3e3"}}, @replay_esn_val={0x24, 0x17, {0x2, 0x70bd28, 0x70bd26, 0x70bd29, 0x70bd2d, 0x3, [0x8, 0x156]}}, @user_kmaddress={0x2c, 0x13, {@in, @in6}}, @replay_thresh={0x8, 0xb}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x82a76ff5545b73bd}, 0x0) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)) r2 = socket(0x10, 0x807, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10}, 0xfffffffffffffccc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1c}, 0x1}, 0x0) 03:09:38 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x10cc0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x4000000000008001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0x15, 0xb0, &(0x7f0000000000)="dbb512641b90966242321465b87aff3e2d6802e5e1", &(0x7f0000000080)=""/176, 0x6}, 0x28) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x204, 0x12, r0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000240)={0x1ff00000, 0x7, 0xffffffff}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)=0x9, 0x4) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000340)='\x00') [ 241.891489] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 241.898749] BTRFS error (device loop6): superblock checksum mismatch 03:09:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:09:38 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x0, 0x4d}, 0x7) mkdir(&(0x7f0000000880)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) socketpair(0x4, 0x80807, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f0000000380)) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x101000, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000080)={0x36, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x13, './file0/file0/file0'}]}}, 0x36) write$P9_RGETATTR(r1, &(0x7f0000000480)={0xa0, 0x19, 0x1}, 0xa0) eventfd2(0x0, 0x9f7cf868c7eb832c) write$P9_RREADLINK(r1, &(0x7f0000000440)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any='access=any', 0x2c}]}}) syz_fuseblk_mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:09:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="024cc8356d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8947, &(0x7f00000000c0)={'veth1_to_bond:\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b}}) close(r2) close(r1) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x6, 0x20000) r4 = mmap$binder(&(0x7f0000013000/0x4000)=nil, 0x4000, 0x1000000, 0x94030, r2, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000200)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000240)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f00000002c0)={0x0}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000004c0)={0xc0, 0x0, &(0x7f0000000300)=[@register_looper={0x630b}, @reply_sg={0x40486312, {{0x4, 0x0, 0x4, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40, &(0x7f0000000180), &(0x7f00000001c0)=[0x20, 0x38, 0x78, 0x48, 0x28, 0x30, 0x18, 0x0]}, 0x5}}, @decrefs={0x40046307, 0x1}, @increfs_done={0x40106308, r4}, @acquire={0x40046305, 0x4}, @increfs_done={0x40106308, r5, 0x3}, @request_death={0x400c630e}, @acquire_done={0x40106309, r6, 0x4}, @increfs_done={0x40106308, r7}], 0xc9, 0x0, &(0x7f00000003c0)="3e56103425d3a5a4472bf29c778c132f1024b9ac4d6de2212403e1ac046c5b4ee562bad856112b16162125630c0ebd7e6b25a34e05c0793d6a266921201c046ec027de34c13bdcbb499abf6f148860ddd18e7e769857a0fb16f67112283224591fe1a0b66d11892288aded19c2f76ed283fd149d5313eae14888ecf997a29b08c2dc3968e544dbcb2152fc753e97d81911e3e3426dfc5bea983a6c79bf101a1c63fdeb3c85561b2e5e659674f97f8a4c243e1ad6b85b39c019ac825cefad9f3f34efbe79c2fdadf18b"}) ioctl$sock_bt(0xffffffffffffffff, 0x8906, &(0x7f0000000100)="68dfb1b9a3d0a72b2eaa3b0b2619b76b675445c81f6f494bc3bbff06f304310fd10f6ee81cfc3eca813e80dc03529153d24d4dd6b44e59e21ca7a6fb569d9938e5d7d28c066e649aaa7d4e95a54f8a942573ef4495584d7254812d8f277a872a4d563a1aa1dc8b1d9a") [ 242.021351] BTRFS error (device loop6): open_ctree failed 03:09:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0xf3d7f77846b7d33a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000001c0), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x200, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x0, 0x4) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000180)=r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={"6c6f3a2c000081800000faffdff700", &(0x7f0000000040)=ANY=[@ANYBLOB="410000001cbd000000000000002a1000000000000000008000000000006f7832ae1a4d5cc242fd2bbedc7222cd9a6827c354dc9ccbd550bbf1e7f3a1139ba7684ada0cbb8423b477d45f94b1be0a5e766177f7a72b8cf4da4a9e130ef184192b579f55e550dbf84f1409f5315be8cc6f766f747b931e4a4178c82b19587e890089f97afae7c2471516e0519fcafe52643fabc1b37748561d1b3c911d26f72be3a2506d39827f24582b7e9de1cdc5da39cc12c9bb0c4e831ac241f406012dc31e50c3fcfb55f51ae6"]}) 03:09:38 executing program 2: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba000000000000000000000000", @ANYBLOB="030000fd0000000008001b0000000000"], 0x2}, 0x1}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) dup2(r2, r0) 03:09:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, 0x139, 0x5, 0x3161, 0x3, 0xc}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={r2, 0x6, 0x20}, 0xc) pread64(r1, &(0x7f00009f3000), 0x352, 0x0) 03:09:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a2c000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x801) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000d95000)={0x7fffffff, 0x3f}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xffff, 0x220000) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x7, 0x5, 0x1, r3}) write(r1, &(0x7f0000b50000)="07689352530800000000000000572a1b12555bab7b3a50fecfaa3f68000ebfbd79b02958d5fd79310e4140f5529e7022ad5f353d6bf1d35a20ef8b9cedff0ac9652898678de650df2f8e6061fa9f2ba9829ba8f73c3cc1dbbb70898a2cd23baae106780c45e24993a1647bb071c3ecbfefea0b4a3230360d22ffcf20bb1eea0210b916a7ed5cab1b69b586e546fcb0d53b3edeb976c68370d3d97c714c03dc2b501d31524fe9114edd2450fb0a14064737dcbc30340d840d", 0xb8) 03:09:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:39 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), 0x4) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 03:09:39 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='sysfs\x00', 0x0, &(0x7f000000a000)) lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=@known='security.selinux\x00', &(0x7f00000005c0)='vxfs\x00', 0x5, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x10103f, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 03:09:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x21c000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000280)=0x10, 0x800) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x20000, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000300)=""/246) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x7, 0x9, 0x10001, 0x2, 0x1, 0x6, {0x0, @in={{0x2, 0x4e23}}, 0x7fff, 0x8001, 0x7fff, 0x19, 0x40}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r3, 0x8}, 0x8) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="247f00000201ffff00000000000000000000200008001500de0000000800080004000000"], 0x24}, 0x1}, 0x0) 03:09:39 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x4) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000040), 0x4) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000300)=""/193) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000002000)}) r4 = mmap$binder(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000002c0)={0xc, 0x0, &(0x7f00000001c0)=[@free_buffer={0x40086303, r4}], 0x0, 0x0, &(0x7f0000000240)}) [ 242.426825] binder: 11340:11341 ioctl 40046205 4 returned -22 [ 242.439404] binder: 11340:11341 BC_FREE_BUFFER u0000000020004000 no match [ 242.455006] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 242.462352] BTRFS error (device loop6): superblock checksum mismatch 03:09:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:39 executing program 7: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x280, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x3) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000140), 0x8000fffffffe) dup2(r2, r1) fadvise64(r1, 0x0, 0x0, 0x4) [ 242.471630] binder: 11340:11353 ioctl 40046205 4 returned -22 03:09:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x18) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback={0x0, 0x1}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}}]}, 0x80}, 0x1}, 0x0) [ 242.505812] binder_alloc: binder_alloc_mmap_handler: 11340 20001000-20004000 already mapped failed -16 [ 242.517986] BTRFS error (device loop6): open_ctree failed 03:09:39 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") sendmmsg(r0, &(0x7f0000000840), 0x3d0, 0x0) 03:09:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x1, 0x20, 0x2, 0x27, 0x2, "a85dd318cace9e2cee59ef5a0893157a4e5db3fb666107363d6b1baeeb57ef773c88d3a64725a7e71850c2f7195a615a2c58c574c2c3f7e41bcbf5e7c6b6e8", 0x1c}, 0x60) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x4, 0x2, 0x9, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x2a5) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x7}, 0x10) [ 242.590575] binder: BINDER_SET_CONTEXT_MGR already set [ 242.633649] binder: 11340:11341 ioctl 40046207 0 returned -16 [ 242.681680] binder: 11340:11341 ioctl c0306201 20007000 returned -14 [ 242.722784] binder: send failed reply for transaction 18 to 11340:11341 [ 242.752174] binder: undelivered TRANSACTION_COMPLETE [ 242.760191] binder: undelivered TRANSACTION_ERROR: 29189 03:09:39 executing program 4: stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000036c0), 0x0, 0x0, &(0x7f0000003880)={0x0, 0x989680}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x18}, 0x2c) accept4(r0, &(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000000)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x101, 0xd7c}, &(0x7f0000000200)=0x8) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='dh\x00'}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000340)={0x12713, 0x3, 0x4, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)={r2, 0x3}, &(0x7f0000000280)=0x8) 03:09:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000040)="66b9e70200000f3266b80500000066b94c8d71280f01c164f5b848000f00d0baa00066b87b00000066efb8bc000f00d80f01d1b8e8000f00d83ed952d73e0f08", 0x40}], 0x1, 0x0, &(0x7f00000000c0), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cuse\x00', 0x4400, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000540)="339df88caf0353f6a8a035e36cb484bc", 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000026000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000001c0)="64650f01d10f21c13e0fc71ee4e564260533092e0f083e3636650f1811650f01cf0f20d86635200000000f22d80f0138baf80c66b8d0ffdb8566efbafc0c66b80900000066ef", 0x46}], 0x1, 0x0, &(0x7f0000000300)=[@cr4={0x1, 0x40220}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xaa, 0x40) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000100)={0x1, 0x6, 0x7fff}) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000064e000)={0xffffffffffffffff}) fcntl$setownex(r2, 0xf, &(0x7f0000704000)={0x2}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x401, 0x7, 0x5}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 03:09:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:39 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00002c5fe8)={0xaa}) r1 = epoll_create1(0x80000) r2 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000013000)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000ba8ff9)=""/7, 0x7}], 0x1) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="45000000443dc3d0d0eacca5b6b7e72604f4d99fb9366c6978411855c8acc5b40c154bbb7607714d52eaa5c76265b5c323d616ea3b4d4644031bac4082cd68a5abeb9a746dd07d05fb"], &(0x7f0000000140)=0x4d) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) fgetxattr(r0, &(0x7f0000000180)=@known='trusted.syz\x00', &(0x7f00000001c0)=""/134, 0x86) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") dup3(r1, r0, 0x0) 03:09:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") r1 = socket$key(0xf, 0x3, 0x2) r2 = semget$private(0x0, 0x5, 0x91) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000040)) semop(r2, &(0x7f0000000080)=[{0x1, 0xef, 0x1800}, {0x6, 0x7, 0x1800}, {0x3, 0x4, 0x800}], 0x3) sendmsg$key(r1, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)={0x2, 0xd, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@multicast1=0xe0000001}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}, @sadb_x_sec_ctx={0x1, 0x18}]}, 0x88}, 0x1}, 0x0) 03:09:39 executing program 7: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000ec6000)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000358fe8)={0xaa}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x96, 0x4) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000a5dfe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) readv(r0, &(0x7f0000080000)=[{&(0x7f0000001fb2)=""/1, 0x1}], 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000da6feb)='/proc/self/net/pfkey\x00', 0x0, 0x0) lseek(r2, 0x0, 0x0) 03:09:39 executing program 5: syz_mount_image$nfs4(&(0x7f0000000100)='nfs4\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000240)="2ded37a7a4fd17b6489316f24f0bfcab7d83", 0x12, 0x8}], 0x90030, &(0x7f00000002c0)='/dev/input/mouse#\x00') socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000001c0)="7465616d5f7300e4ffff5e3300") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000100013070000000000000000e00007000000000000000000000000000000000000000000000000000000000000000000000000001100000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff000000003200000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00040000000000000048000200656362286369706865725f6e756c6c290000000000000000000000000000000000000000000000000000000093d337000000000000000000000000000000000000000000"], 0x138}, 0x1}, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0xfff, 0x4840) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000180)=0x5, 0x8) 03:09:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x4000000002, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/33, 0x21}, {&(0x7f0000000080)=""/180, 0xb4}, {&(0x7f0000000200)=""/216, 0xd8}], 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x0) write(r1, &(0x7f0000000000)="260000001a0053eb910000f9090000000000000015e0f1ff609b000000ec5501000d69d488d8", 0x26) [ 242.962658] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 242.970065] BTRFS error (device loop6): superblock checksum mismatch [ 242.988602] x_tables: duplicate underflow at hook 4 03:09:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878", 0x8a, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:39 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x150) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:09:39 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000040)={0x2004}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) r2 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100), 0x0, 0xfffffffffffffff8) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000140)='keyring\x00', &(0x7f0000000180)='/dev/sequencer\x00') [ 243.039968] x_tables: duplicate underflow at hook 4 [ 243.079288] netlink: 72 bytes leftover after parsing attributes in process `syz-executor5'. [ 243.099620] BTRFS error (device loop6): open_ctree failed 03:09:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001400)=@filter={'filter\x00', 0xe, 0x4, 0x1158, [0x0, 0x20000280, 0x20000e90, 0x20000fa0], 0x0, &(0x7f0000000180), &(0x7f0000001480)=ANY=[@ANYBLOB="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"]}, 0x122f) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x80802) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000040)) [ 243.138617] netlink: 72 bytes leftover after parsing attributes in process `syz-executor5'. [ 243.181728] BTRFS error (device loop3): superblock checksum mismatch 03:09:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) finit_module(r0, &(0x7f0000000000)='/dev/ptmx\x00', 0x0) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f00000000c0)="bf", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0x11) close(r0) 03:09:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = semget$private(0x0, 0x7, 0x8) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000100)=[{0x3, 0x7, 0x800}, {0x4, 0xffffffffffffff01, 0x800}], 0x2, &(0x7f0000000300)={r2, r3+30000000}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000080)={0x80000001}, &(0x7f00000000c0), &(0x7f0000000140), 0x8) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0xfb0, 0x800) renameat(r4, &(0x7f00000001c0)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00') futex(&(0x7f0000000040), 0x2400000088, 0x0, &(0x7f00008b5000)={0x0, 0x989680}, &(0x7f0000000000), 0x0) 03:09:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="025cc83d6d345f8f762070") close(r1) io_setup(0x8, &(0x7f0000000100)=0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) io_submit(r2, 0x0, &(0x7f0000001840)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000240)='./file0\x00', r3, r4) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0xfe}]) [ 243.227860] kernel msg: ebtables bug: please report to author: Wrong len argument 03:09:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:09:40 executing program 7: r0 = open(&(0x7f0000000040)='./file0\x00', 0x505340, 0x1) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) prctl$intptr(0x17, 0x9) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x1}) ioctl$TUNSETOFFLOAD(r2, 0x800454d3, 0xa07000) 03:09:40 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)="0990e9ef6587c183be95649a274afba9128401cdb2caae2513aca61f5ba87a3596110fd97fb7916affed269f6e9ea4effb4d9df851ac8f10b670c630c0f9aa1abcbc95a7c81ef1c945031be0e06fe6daa24b588c329296b5c1061a0069f95cb08e137410980f27d1fa0db77d65cd5d622761de08b7991773e715b7ab4967065d5286b95cc808ab5c8b35c19b8dd0030fb5d1855cfcbcbd893d929ad17a56cfcc75a788d684216c", 0xa7, 0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x80) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000180)={0x303, 0x33}, 0x4) [ 243.276508] BTRFS error (device loop3): open_ctree failed [ 243.291211] kernel msg: ebtables bug: please report to author: Wrong len argument 03:09:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878", 0x8a, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:09:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878", 0x8a, 0x10000}], 0x0, &(0x7f0000000240)) [ 243.391677] encrypted_key: master key parameter 'éïe‡Áƒ¾•dš'Jû©„Ͳʮ%¬¦[¨z5–Ù·‘jÿí&Ÿnž¤ïûMøQ¬¶pÆ0Àùª¼¼•§ÈñÉEààoæÚ¢KXŒ2’–µÁ' is invalid 03:09:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-des3_ede-asm\x00'}, 0x58) r2 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0xd441, 0x4000) openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r3 = accept4(r1, 0x0, &(0x7f0000000180)=0xffffffffffffffe2, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r3, &(0x7f00000001c0)='|', 0x1, 0x0, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x101000, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x200, 0x0) ioctl$TIOCNXCL(r4, 0x540d) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000140)={0x4000000000, 0x2, 0xcb7, 0x8000, 0x2, 0x590}) recvmsg$kcm(r3, &(0x7f00000005c0)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0x7ffff000}, {&(0x7f0000000540)=""/15, 0xf}], 0x2}, 0x0) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x80000001, 0x800) 03:09:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='syscall\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) getpgid(0xffffffffffffffff) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='smaps\x00') getpeername$inet(r2, &(0x7f0000000080)={0x0, 0x0, @loopback}, &(0x7f0000000100)=0x5c) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000500)=0x5, &(0x7f0000000540)=0x2) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000005c0)={"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"}) [ 243.469332] encrypted_key: master key parameter 'éïe‡Áƒ¾•dš'Jû©„Ͳʮ%¬¦[¨z5–Ù·‘jÿí&Ÿnž¤ïûMøQ¬¶pÆ0Àùª¼¼•§ÈñÉEààoæÚ¢KXŒ2’–µÁ' is invalid 03:09:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x40000000002, 0x3, 0x39) sendto$unix(r1, &(0x7f0000000080)="e1fdc3ae396b2760a47041afdf289f4fa65851a043aa383a0dd37cbde49ea1ace59bb9c2935682ed67879841bfb03746afe4214c4177ce5039a8151b458eaadf1ac8e0e3", 0x44, 0x0, &(0x7f0000000d00)=@abs, 0x6e) ioctl$sock_bt(r1, 0x8906, &(0x7f0000000040)) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000000)=@rc, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)=""/185, 0xb9}, 0x0) accept(r1, &(0x7f0000000100)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @local}}}}, &(0x7f0000000180)=0x80) 03:09:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1, &(0x7f0000001ac0)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xc90c, 0x8, &(0x7f0000001900)=[{&(0x7f0000000300)="33f81acaf13b7697ca205028659b4f5439541e2fb5b4bf428c9698f37c2518370e4119bdb05f0edd80ddeba1690befbc7cb72b6a2ccbae09652ea533ff47933f30e7d6105e2e20cf556aaa144768ee84e6772b66a2195362fd474bc4c50a39ae278a3c44f2e23e7ed555be13a434f06cec48aca9bf8bfd3bebe0116f38bf753ee710b7a50bf2f075a645af7a67a292de4923875947485c9367c5e300624afd6a27cf03ba2b09174de99f8094007b025de76affa006cb7c2de402775145b82a14aa9d2416332826017fabf09a261c84d98ad31d44d792b91bba2c3002cb", 0xdd, 0x7f}, {&(0x7f0000000400)="64b91f77344a5b01698346ee5414eeed53d23984c08d0d5952f005ac1fa285b72bb775a16f63d4f9122341be1fad435f52db6cc15076bc72c0a1396c92252354345f572fdef81447096621830c7034109b05d63fe593aec53e22daf7cafefaf64839b34c043f54b0542eda", 0x6b, 0x29}, {&(0x7f0000000480)="c0452ef351e7060709a640bb398b379d7a7b31959adf2df876710a7597b53ac09c3a39947975458055dbad346a424a939f85075b6ae1d1f940b4c3825331069d1bc5a158f59c39a4ed22a33febb1474ab9063382a551454b081f20af4a3cc087131960793e1b38bef28e331d91cf107f48c5e2e7381f5a756d37cfb7ace8ea2c1c7f14e9f6d6ab", 0x87, 0x3406}, {&(0x7f0000000540)="3892fd5f2e6b3be89740aa1edf4cceec227eb1625ebc09004b1d1c9a4ade08fb1f4d5e116808c28b091c5f424068490f73e9baa3c687cbca95a3ceaf3509ecef7f99ed2dd7a43eafff90ba5f6eb0c72f196e7e32f9420db8d3028d76f69f6e4862c28a7b76cab65c2d67a3f95684f0eeccab8ee9a83161d3568a90af98144ea8116d938fa03b405c28d5f66ff8cdc333136eaebab2163c3a8f2ebbd4a592ba9e87dca29f6831c1388146da00194cb0c244b906a2fe2102e116c521b074015b07c6dae8c1e3211f1c198945583e14459205cb", 0xd2, 0x9}, {&(0x7f0000000640)="4563139288bb95ddd22d05ae2f8824079e37f2a98f0afb5f5a351ba6ad5e428625dcdba99d5e9072cbfa7b8c89b4f4bbd5f4b375c93df48bb638f4475d99920aec516cb4352c356e6db67e2d64bca374ffeb23e71677c30a727192163b7db25faf1f50886942e7f4000d0fd728a0129ee8d97b616850c4191f82653007e133c8c007fc1f198e27fc7a7570e7b63f3061cdc2f0e04930242ed6701cdd6c7c77d6ffb31ecfb1cb255f52a0a5a10ce9f0808099eae38a04d59f1ecee05430d9a8d2814b292acf4ffca22b28b5b721d39a48aac43e56d97b", 0xd6, 0x6}, {&(0x7f0000000740)="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", 0x1000, 0x6}, {&(0x7f0000001740)="65556da50fbe358fa9410cdbe5a70701a1b9da4e9778b9f9ec08f88720201f31795331708e5b9748317abd64bacd53e121fea419b7c7fb48f994acf61f08f87bfc02d12f1b505642e3ae663959f25d6415dc32182e3d2420cf78b06e18e115f8addc3c804cd45496b841152097828956a50d07715f46fbf803e47e1b743dfb602436709c8b20c06e1b8cd2b14244197654bc2a8909ac1f7b55fe78550c4813505950c9f79ca0d3e557b2f3676dcb8d70a648f5d2eba939d403e1619512cfba4c287af43e675a81457bd3fd60891ecfca459a2bec6c6f56aa8ff9c6e94c278990", 0xe0, 0x800}, {&(0x7f0000001840)="64571c0844302f8c4aa36b4ed62aeb746103083abe6e9e04d1ea9dd7e55964e833ba47c473f071fcd40e9c033b35a342b0cd09c4b5fdabf8924359fd6660df8b76ff774eb687ca09603fa9d76d9c3c4ffa59d422032a31d94726ee9469b4251935e60a3fe3f96694810c519e1e8af825151db02bdd22f633ddf1a6c7e797e3bd20c455074612a63774aa8f857d487716d52d0e73f594f048df9df3c052c8bb532b2c0484fe9b6e43eeb79866", 0xac, 0x1}], 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00']) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000000046900000100000000000000180000"]) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) write$eventfd(r4, &(0x7f00000019c0)=0x401, 0x8) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) accept4$nfc_llcp(r4, &(0x7f0000001a00), &(0x7f0000001a80)=0x60, 0x80800) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000001c0)={0x2, 0x0, [0x488]}) 03:09:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878", 0x8a, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:09:40 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x34, 0x1) ioctl$int_out(r0, 0xc0385720, &(0x7f0000000100)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x6, 0x21ac00) fcntl$setlease(r0, 0x400, 0x2) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x7) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x0, 0x0, 0x2, 0x0, 0x25}}) [ 243.661899] raw_sendmsg: syz-executor7 forgot to set AF_INET. Fix it! 03:09:40 executing program 0: r0 = socket(0x2, 0x3, 0x40000000000000ff) sendto$inet(r0, &(0x7f00000002c0), 0x0, 0xfffffffe, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 03:09:40 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x8200) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) vmsplice(r1, &(0x7f00004e8000)=[{&(0x7f0000004980)=';', 0x1}], 0x1, 0x0) mbind(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, &(0x7f00000001c0), 0x20, 0x2) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000000)={0x8, 0xa6}) r4 = getpgrp(0x0) ptrace(0x4219, r4) 03:09:40 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sendmsg(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffe2c, &(0x7f0000000080)=[{&(0x7f00000003c0)=',', 0x1}], 0x1, &(0x7f0000000140), 0xb0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001180)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb3532da1f23a262055223e7a3a62f15eeb8060dc9cfa30e6783757ae2f0ac6ed75d3212591ccd73de4aed62fda77585403cb2d1446e86c12fc6ad1b8f954960a439a096ec3bf1dcc6e8cff12c8abe42391d75c0861ddd448b7dbf208cf748c9de63551ee1d1c14934b18d", 0x2c1}], 0x1, &(0x7f0000000200)}, 0x8000) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d7}], 0x1, &(0x7f0000001780)}, 0x0) 03:09:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 243.835331] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:09:40 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000d40)=0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x4) getsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x2) close(r0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000140), 0x700000000000}]) 03:09:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d", 0xcf, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:40 executing program 1: userfaultfd(0x80000) r0 = userfaultfd(0x80000) r1 = socket(0x400000000010, 0x8000000000000003, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x110) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000080)=r0) write(r1, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1400c08000b0000060000", 0x24) [ 244.031272] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:09:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000008912, &(0x7f00000000c0)="025cc83d6dafaf16b19b3730a371ac94dfdf818cbd08f4332df8256043bf383b92a4996e9f8b1849758721f70b4b2d53f0f402121f6287c35f45b2c085edf642a427c521a09848882edb6b6e956ebacf19d3afb76b9d32bd674129028c90fa33811fe89a6d5c22ade99a19af540841a0e8e4e85a42520f025b779734aa60ceb7b88c6378f65e889357217cb1eab83b0685d65129d0670ad1b99d7901e26662aee3b28d762e7c5f50a457b446f0160edb3c7696ff0f45ed24c1623cf84e3dde3acf093dc100000000000000") r1 = socket$unix(0x1, 0x2, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, "e91f7189591e9233614b00"}, 0xfffffffffffffd16) listen(r2, 0x0) connect$unix(r1, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0x216) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e23, 0x8, @remote={0xfe, 0x80, [], 0xbb}, 0x214}, {0xa, 0x4e23, 0x1, @empty, 0x9}, 0x8, [0x7, 0x0, 0x10000, 0xbbb, 0x1, 0xa522, 0x1, 0x6]}, 0x5c) dup2(r1, r2) 03:09:40 executing program 4: r0 = socket(0x20000000000000a, 0x2, 0x0) flistxattr(r0, &(0x7f0000000100)=""/172, 0xac) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000200)=""/46, &(0x7f0000000240)=0x2e) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) sendto(r0, &(0x7f0000000040)="3c776374a2907f6c22aa1eca96100b78278baadc2a6dc1d564670d272aef7c409515ea82599aed5fafe7cfa3036dbdd24c4291bde354744088d38e4aee", 0x3d, 0x4008000, &(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x2, 0x3, 0x1}}, 0x80) [ 244.095859] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 138277443427868 transid 756082810144684242 /dev/loop3 03:09:40 executing program 0: r0 = getpgid(0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000400)='/dev/admmidi#\x00', 0xffffffffffffffff, 0x901) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000440)={0x10001, 0x0, &(0x7f0000ffd000/0x2000)=nil}) ptrace(0x4207, r0) delete_module(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0xa00) r2 = memfd_create(&(0x7f00000000c0)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0) ptrace$setopts(0x4206, r0, 0x3, 0x4) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000180)) r3 = syz_open_dev$sndctrl(&(0x7f0000000d00)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000d300000000028000007a0a00ffffffff006b01"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000500)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000b60c6ec4000000000000050000000000000000000000000000009500000040000000"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) ioctl(0xffffffffffffffff, 0x200008912, &(0x7f00000001c0)="0047fc2f07d82c99240970") socket$inet(0x10, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000000)=""/18) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000003c0)={0x7fff, 0x6}, 0x2) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc0405519, &(0x7f0000001000)) 03:09:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = semget$private(0x0, 0x20000000102, 0x0) semop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x800}, {0x2, 0x6}, {0x2}], 0x3) semop(r1, &(0x7f0000000100)=[{0x0, 0xfffffffffffefffc}], 0x1) semop(r1, &(0x7f0000000040)=[{0x0, 0x8, 0x800}], 0x1) semop(r1, &(0x7f0000000000)=[{0x0, 0x7}], 0x1) [ 244.247368] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 244.254666] BTRFS error (device loop3): superblock checksum mismatch 03:09:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x84, 0xff, 0x1}, 0x14) mmap(&(0x7f000000d000/0x1000)=nil, 0x1000, 0x1, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000cff9)={r0, 0x18, &(0x7f000000c000)}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 03:09:41 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) sendto$llc(r0, &(0x7f0000000140)="acc5c9c6c277a23e8eb44284c725f86837e565895918596f2feeb14f4f38b2bb79c57030ab62877d080af0d663d89ea5e9bbc9858688f9541633b4b76b3329bf1232d4e73fe5fa3e9b887d3828e10403032c8ea250cb7082f1250f69d47aad1f2e997bfb42090d321b93282eb1dd75794341094daf760503c50082fab55585c4f81028701c259a56d6e45f9b0eb834c974c6feb2f6cdb8a9e41bbfcac52da05bc5cd28594803990a9805732ea6261a141e0d552d59ac8ac49b32cc7fdfde60053c452ec63662d4ac360d13be73d2de17a8054613e757256e827aff791dda28234fdf2fb50f86f554dce1b5b2", 0xec, 0x48000, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) readv(r1, &(0x7f0000000000), 0x0) pwrite64(r1, &(0x7f0000000040), 0x6a17, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x59) [ 244.318379] BTRFS error (device loop3): open_ctree failed 03:09:41 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000380)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x40100, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x8, 0x1) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x9) sendto$inet(r0, &(0x7f00000003c0)="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", 0x1, 0x0, &(0x7f0000000140)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x5) shutdown(r0, 0x1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='vcan0\x00', 0x10) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0xd60d, 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) 03:09:41 executing program 0: r0 = inotify_init() mkdir(&(0x7f0000000180)='./control\x00', 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./control\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="070800000000000000be616e733d66646c7a666c13a2d5173513a9b83ae7bfa60cf08400d2a1c4383617bf4bf20ebb2800bce6a1c95673d8fae42d1dc3c31226200d3ab3c0e917b3fa38e89f35fd07aba28c8dd01f06000000295465367c196b2c5a5b4c5c834d0000000000000000000000", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',\x00']) r2 = inotify_add_watch(r0, &(0x7f000003a000)='./control\x00', 0x80000d50) inotify_rm_watch(r0, r2) 03:09:41 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) 03:09:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d", 0xcf, 0x10000}], 0x0, &(0x7f0000000240)) [ 244.507084] 9pnet_virtio: no channels available for device (null) 03:09:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{0x77359400}, 0x3, 0x4c, 0xfffffffffffffffc}, {{}, 0x0, 0x4}], 0x30) 03:09:41 executing program 2: mmap(&(0x7f0000000000/0xfd4000)=nil, 0xfd4000, 0x2000001, 0x40004000000031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfc1000)=nil, 0xfc1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fc1000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f00000000c0)}) [ 244.566127] print_req_error: I/O error, dev loop6, sector 128 [ 244.579692] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 244.586996] BTRFS error (device loop3): superblock checksum mismatch [ 244.589771] 9pnet_virtio: no channels available for device (null) 03:09:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878", 0x8a, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:41 executing program 4: unshare(0x20020000) mkdir(&(0x7f00001a3000)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='.', &(0x7f0000000480)="b3b8155713fb18dea1325403cf49458ea055d7591982903d491d14c2e9cbc39e8bf705c21d4cc6c570ba1b1b03c6db40040c163a6dee9329d669c3a83a02ef2119957d6d4d06f79c5d29c3f97acbbbd1a0034898939712cc63020f31107f31c3a7ea6b055a3d9cd058451eefee6ebdb0357831796761e16f810e2452be7d0bbb99ee890739873f2de48187428342a5e95f625e7b49265dcb01cdb718bd2920863ed6af48bf044ad87394625a24423d5fefebc93d3a4a96d582c636a0bc3ec3fa80854deb41daa221d12ed5bdc1aeaabed9dcbb850b47a98ab25649387ab11d7b205a07b9082b736c17f97d", 0x1004, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x3f, 0x0) getxattr(&(0x7f0000000200)='./file1\x00', &(0x7f00000003c0)=@random={'btrfs.', '/securityproc\x00'}, &(0x7f0000000580)=""/4096, 0x1000) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000280)={0x7, 0x9, [{0x0, 0x0, 0x3}, {0x5, 0x0, 0x6}, {0xffff, 0x0, 0x200}, {0x4, 0x0, 0xffffffff00000001}, {0x7, 0x0, 0x80000000}, {0xfffffffffffffff9, 0x0, 0x59}, {0x9, 0x0, 0x4}]}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00', &(0x7f00000000c0)='+$:{\x00', 0x5, 0x2) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='.', &(0x7f0000000480)="b3b8155713fb18dea1325403cf49458ea055d7591982903d491d14c2e9cbc39e8bf705c21d4cc6c570ba1b1b03c6db40040c163a6dee9329d669c3a83a02ef2119957d6d4d06f79c5d29c3f97acbbbd1a0034898939712cc63020f31107f31c3a7ea6b055a3d9cd058451eefee6ebdb0357831796761e16f810e2452be7d0bbb99ee890739873f2de48187428342a5e95f625e7b49265dcb01cdb718bd2920863ed6af48bf044ad87394625a24423d5fefebc93d3a4a96d582c636a0bc3ec3fa80854deb41daa221d12ed5bdc1aeaabed9dcbb850b47a98ab25649387ab11d7b205a07b9082b736c17f97d", 0x1004, 0x0) mount(&(0x7f0000000400)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000180)="6d736c6f73009d4f11ca11cbe80f76644f544a585a52e04a2595c193a1a39a2ef872d4310d9409cbfe18343f276b38378340c067ec4afd93d1dc0a8fad4ee9fb78aa704fbe69e96b2f677af80b9b875e37c3e6289bcc1e299639eb7938eb4acb69f2", 0x5010, &(0x7f00000003c0)) mkdir(&(0x7f0000001a80)='./file0\x00', 0x4) poll(&(0x7f0000000080), 0x0, 0x400007f) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00') ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000140)={0x400000000000000, 0x1, 0x0, 0x6, 0x9}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000001580)={{0x9, 0x3, 0x7fffffff, 0x5, 'syz1\x00', 0x80}, 0x1, [0x0, 0x6, 0x0, 0x9, 0x6, 0x9, 0x7, 0x20, 0x3f, 0x9fa5, 0x9, 0x0, 0x4, 0x8000000000000000, 0x4, 0x9, 0x2, 0x5, 0x2, 0x401, 0x20, 0x2, 0x8000, 0x0, 0x2, 0x800, 0x7, 0x6, 0xd0, 0x10000000000, 0xfff, 0x3ff, 0x8, 0x5, 0x2f, 0x10001, 0x0, 0x9, 0x80, 0x100000000, 0x80000001, 0x7, 0x6b9, 0x4, 0xa5b2, 0xb4, 0x6, 0x9, 0x6, 0x9, 0x0, 0x5, 0x1, 0x4, 0x7, 0xb536, 0xffffffffffffff81, 0xfff, 0xffff, 0x68, 0x4, 0x4, 0x6f5c, 0x3, 0xdb, 0xffffffffffffff80, 0x7, 0x3, 0x7c2f, 0x1, 0x7, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10000, 0xe60, 0x100000001, 0x1ff, 0xfffffffffffffff8, 0x1, 0x3, 0x1, 0x973, 0x100000001, 0x100000000, 0x9, 0x3, 0x2, 0x400, 0x2, 0x1000000000000000, 0x100000000, 0x2, 0x8, 0x7f, 0x3, 0x5, 0x89, 0x5, 0x5, 0xc4, 0x9, 0x0, 0x5, 0x2, 0x0, 0x10001, 0x664a0170, 0x54, 0xe5, 0x1, 0x3, 0x2, 0xffffffffffffff6d, 0x3, 0x1ff, 0x5, 0x101, 0x6, 0x0, 0x101, 0x4, 0x3f, 0x2f, 0x6654], {0x0, 0x989680}}) [ 244.701364] binder: 11631:11632 Acquire 1 refcount change on invalid ref 0 ret -22 [ 244.701712] BTRFS error (device loop3): open_ctree failed 03:09:41 executing program 1: r0 = socket$inet6(0xa, 0x5000000000006, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) getsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 03:09:41 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff00000000bf2000000000000095"], &(0x7f0000000100)='GPL\x00'}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) r2 = dup2(r0, r0) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000080)="a15372643f0d9074bdcc779378164a8a56bfd8de1c8a5f66f0d603535b3cdf744cf2f48ee20675d86019396eebd96b5341ed22ef12d0d560724800f9d94ee65f0bb07254403ee990ded34ff0eadb8c159a53eee9b7572b28") setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)={0x0, 0x0, [0x0, 0x0, 0x0, 0xfe0]}) [ 244.744940] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 756082810144684242 /dev/loop6 [ 244.799827] binder: 11631:11647 unknown command 0 03:09:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d", 0xcf, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878", 0x8a, 0x10000}], 0x0, &(0x7f0000000240)) [ 244.821737] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 244.835270] binder: 11631:11647 ioctl c0306201 20a20000 returned -22 [ 244.898853] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 244.915582] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 244.922857] BTRFS error (device loop3): superblock checksum mismatch [ 244.972727] BTRFS error (device loop3): open_ctree failed [ 244.985902] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 244.993253] BTRFS error (device loop3): superblock checksum mismatch [ 245.005323] BTRFS error (device loop3): open_ctree failed 03:09:41 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d", 0xcf, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") unshare(0x40000000) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0x906}, &(0x7f0000000180)=0x8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000080)={'lo\x00', {0x2, 0x0, @rand_addr=0x40000000}}) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 03:09:41 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x30) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x200000) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000140)) setreuid(0x0, r1) r3 = memfd_create(&(0x7f0000000340)='^vmnet1posix_acl_access+vboxnet1\x00', 0x0) fsetxattr(r3, &(0x7f0000000080)=@known='security.selinux\x00', &(0x7f0000000180)='\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x8f, 0x1ff, 0x134c, 0x7, 0x10001, 0x800, 0xbc, 0x7fffffff, 0xdf, 0x2}, 0xb) fcntl$addseals(r0, 0x409, 0x7) [ 245.221626] IPVS: ftp: loaded support on port[0] = 21 [ 245.240189] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 245.247644] BTRFS error (device loop7): superblock checksum mismatch [ 245.257287] BTRFS error (device loop7): open_ctree failed 03:09:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878", 0x8a, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000180)="c7442400e9000000c744240200000100c7442406000000000f011c24450f088f09b895f665410f3248b8b8789b86000000000f23d00f21f835100000000f23f826420f080f20d835200000000f22d866430f50ed650fc718c421c812f8", 0x5d}], 0x1, 0x0, &(0x7f0000000080), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000280)="263ef30f524d02baf80c66b8c6b3c88b66efbafc0cb8ce5def3665dec9f4260f01ca66b9800000c00f326635000800000f306665670f1f00670f017cec35f40fb39adc00", 0x44}], 0x1, 0x0, &(0x7f0000000340), 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000003c0)=ANY=[@ANYBLOB="014000000000000000000000000000000000000000000000000000000000000000fcffe7"]) r3 = getpgid(0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) setpgid(r3, r4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318", 0xf1, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:42 executing program 5: capset(&(0x7f0000000180)={0x19980330}, &(0x7f00009b3000)) lookup_dcookie(0x0, &(0x7f0000000000)=""/62, 0x3e) recvmmsg(0xffffffffffffffff, &(0x7f0000005e40)=[{{&(0x7f0000000040)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/190, 0xbe}], 0x1, &(0x7f0000000200)=""/182, 0xb6}}, {{&(0x7f00000002c0)=@nl, 0x80, &(0x7f0000000380)=[{&(0x7f0000000340)=""/3, 0x3}], 0x1, &(0x7f00000003c0)=""/24, 0x18, 0x9}, 0x1}, {{&(0x7f0000000400)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000480)=""/204, 0xcc}, {&(0x7f0000000580)=""/103, 0x67}, {&(0x7f0000000600)}, {&(0x7f0000000640)=""/101, 0x65}, {&(0x7f00000006c0)=""/20, 0x14}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/60, 0x3c}], 0x7, &(0x7f00000017c0)=""/49, 0x31, 0x7fff}, 0xffffffffffffffff}, {{&(0x7f0000001800)=@alg, 0x80, &(0x7f0000002d40)=[{&(0x7f0000001880)=""/210, 0xd2}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/149, 0x95}, {&(0x7f0000002a40)=""/17, 0x11}, {&(0x7f0000002a80)=""/65, 0x41}, {&(0x7f0000002b00)=""/144, 0x90}, {&(0x7f0000002bc0)=""/132, 0x84}, {&(0x7f0000002c80)=""/149, 0x95}], 0x8, &(0x7f0000002dc0)=""/150, 0x96, 0x2}, 0x7}, {{&(0x7f0000002e80)=@hci, 0x80, &(0x7f0000003000)=[{&(0x7f0000002f00)=""/155, 0x9b}, {&(0x7f0000002fc0)=""/15, 0xf}], 0x2, 0x0, 0x0, 0x2}, 0x100000000}, {{&(0x7f0000003040)=@ipx, 0x80, &(0x7f0000003340)=[{&(0x7f00000030c0)=""/73, 0x49}, {&(0x7f0000003140)=""/226, 0xe2}, {&(0x7f0000003240)=""/203, 0xcb}], 0x3, &(0x7f0000003380)=""/165, 0xa5, 0x3}, 0x1}, {{&(0x7f0000003440)=@can, 0x80, &(0x7f00000034c0), 0x0, &(0x7f0000003500)=""/225, 0xe1, 0x7}, 0x6}, {{&(0x7f0000003600)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003680)=""/141, 0x8d}, {&(0x7f0000003740)=""/4096, 0x1000}, {&(0x7f0000004740)=""/4096, 0x1000}, {&(0x7f0000005740)=""/109, 0x6d}, {&(0x7f00000057c0)=""/124, 0x7c}, {&(0x7f0000005840)=""/127, 0x7f}, {&(0x7f00000058c0)=""/206, 0xce}, {&(0x7f00000059c0)=""/77, 0x4d}, {&(0x7f0000005a40)=""/78, 0x4e}, {&(0x7f0000005ac0)=""/194, 0xc2}], 0xa, &(0x7f0000005c80)=""/76, 0x4c, 0xff}, 0xce3e}, {{0x0, 0x0, &(0x7f0000005dc0)=[{&(0x7f0000005d00)=""/9, 0x9}, {&(0x7f0000005d40)=""/100, 0x64}], 0x2, &(0x7f0000005e00)=""/48, 0x30, 0x7}, 0x80}], 0x9, 0x1, &(0x7f0000006080)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000006100)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000006200)={&(0x7f00000060c0)={0x10, 0x0, 0x0, 0x40000020}, 0xc, &(0x7f00000061c0)={&(0x7f0000006140)={0x6c, r1, 0x102, 0x70bd27, 0x25dfdbfd, {0x4}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14, 0x30}}, @IPVS_SVC_ATTR_AF={0x8, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5c}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}]}, 0x6c}, 0x1}, 0x804) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000600), &(0x7f00000034c0)=0x8) 03:09:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") signalfd4(r0, &(0x7f0000000040)={0x5}, 0x8, 0x80000) r1 = socket(0x10, 0x803, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d00)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000e00)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0x0, &(0x7f00000008c0)={&(0x7f0000000dc0)=@gettaction={0x18, 0x30, 0x5, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 03:09:42 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d", 0xcf, 0x10000}], 0x0, &(0x7f0000000240)) [ 245.348904] IPVS: ftp: loaded support on port[0] = 21 03:09:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d", 0xcf, 0x10000}], 0x0, &(0x7f0000000240)) [ 245.378699] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 2530879793048935964 transid 756082810144684242 /dev/loop3 03:09:42 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000cf"], 0x1) kexec_load(0x0, 0x7, &(0x7f00000005c0), 0x0) [ 245.459525] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 245.466821] BTRFS error (device loop7): superblock checksum mismatch [ 245.482368] BTRFS error (device loop7): open_ctree failed [ 245.502756] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 245.510153] BTRFS error (device loop7): superblock checksum mismatch [ 245.555850] BTRFS error (device loop7): open_ctree failed [ 245.582942] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 245.590224] BTRFS error (device loop7): superblock checksum mismatch [ 245.627223] BTRFS error (device loop7): open_ctree failed 03:09:42 executing program 4: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 03:09:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318", 0xf1, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:42 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000000100)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) write$vnet(r0, &(0x7f00000004c0)={0x1, {&(0x7f0000001940)=""/247, 0xf7, &(0x7f0000000340)=""/118, 0x3, 0x2}}, 0x68) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) 03:09:42 executing program 7: set_mempolicy(0x2, &(0x7f0000000000)=0xe3, 0x9) clone(0x6820e3404e855f35, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000000)) 03:09:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d", 0xcf, 0x10000}], 0x0, &(0x7f0000000240)) [ 245.747192] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 245.754590] BTRFS error (device loop3): superblock checksum mismatch 03:09:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, &(0x7f0000000300)=0x100) socketpair(0x8, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x7}, &(0x7f0000000100)=0x8) getsockname$inet(r3, &(0x7f0000000040), &(0x7f0000000080)=0x10) accept$alg(r3, 0x0, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000400)={0x9, 0x1f}) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x42) r4 = semget(0x1, 0x0, 0x204) semctl$GETVAL(r4, 0x7, 0xc, &(0x7f0000000140)=""/133) ioctl$sock_bt_hci(r2, 0x400448e7, &(0x7f0000000340)="490b0c672c3b062093794970a9546896083af439360b0fed2f06dd2949db4bbb94c684a81b8f42b036da76500d3cc40f2d9472e018faca7e02fb69cc616f6bab2f2c3d8b70f92aa6ad9438d8410da9ee655f8138aa95df1ba7862f5379b0f84203fa55d1e1853072254629914f83c511d3d8ca5df6b673e4c8d8267290619f2874dad342c3982e00e5fdcbeb0b8315a5ce429e62e57081a8d32cdfcf8eb93daac58570009fea71120d314c299eb0f0") [ 245.881881] BTRFS error (device loop3): open_ctree failed [ 245.894299] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 245.901566] BTRFS error (device loop3): superblock checksum mismatch [ 245.941341] BTRFS error (device loop3): open_ctree failed 03:09:43 executing program 1: socketpair(0x8, 0xa, 0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000001c0)=""/17, 0x11}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) recvmsg(r0, &(0x7f0000003fc0)={&(0x7f0000003ec0)=@xdp, 0x80, &(0x7f0000003f80)}, 0x40000002) 03:09:43 executing program 7: perf_event_open(&(0x7f0000000200)={0x2, 0x227, 0x3e6, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x51, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:09:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0xa00) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x8, 0x6, 0x8}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r2, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x20}}}, 0x6, 0x25ddf35b}, &(0x7f0000000140)=0x90) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @loopback=0x7f000001}, {0x1, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1e}}, 0xfffffffffffffffe, {0x2, 0x0, @rand_addr}, "00000000000010000000000000000004"}) 03:09:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f00000000c0), 0x8) 03:09:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318", 0xf1, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d", 0xcf, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d", 0xcf, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:43 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000240)={{0x6, 0x1f}, 'port0\x00', 0x2, 0x802, 0x9, 0x61, 0x9, 0x8, 0x9, 0x0, 0x5, 0x6f39}) socket$bt_rfcomm(0x1f, 0x0, 0x3) creat(&(0x7f0000000200)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) syz_fuseblk_mount(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)='./control\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) prctl$intptr(0x17, 0x723) 03:09:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x2000) read$eventfd(r1, &(0x7f0000000040), 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x1b, &(0x7f0000000180)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@multicast1=0xe0000001}}, {{@in=@rand_addr}, 0x0, @in=@loopback=0x7f000001}}, 0xe8) [ 247.134600] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 247.141876] BTRFS error (device loop6): superblock checksum mismatch 03:09:43 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000000)={0x88, 0x8, 0x8000, 0x9, 0x2, 0x10001, 0x7e, 0x25}, &(0x7f0000000040)={0x3f, 0x9, 0x9, 0x3, 0xbf7, 0x0, 0xfffffffffffffffb, 0xff}, &(0x7f0000000080)={0x9, 0xe55, 0xffffffffffff0001, 0x89, 0xa63, 0x8, 0xfffffffffffff000}, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={0xac6e}, 0x8}) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f0000000000)) 03:09:43 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0xc0189436, &(0x7f0000000000)) 03:09:43 executing program 7: socket$inet6(0xa, 0x0, 0x0) socketpair(0xc, 0x5, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000080)) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x1, &(0x7f0000000080), 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2b, 0x220100) [ 247.223351] BTRFS error (device loop6): open_ctree failed [ 247.251427] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 247.258724] BTRFS error (device loop6): superblock checksum mismatch 03:09:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f760070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000040)=0x4000000000000) readv(r1, &(0x7f0000000400)=[{&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/176, 0xb0}], 0x2) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 03:09:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318", 0xf1, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=""/106, 0x6a, 0x5fdcfeb}, 0x4}], 0x1, 0x2061, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x80000001, 0x5, 0x7fffffff}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000300)={r2, 0xfffffffffffffffd}, 0x8) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r3}], 0x1, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001480)={0x100000001}, 0x8) 03:09:44 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c000000160001002abd7000fddbdf2502df80fd", @ANYRES32=r2, @ANYBLOB="1400060000feffff86000000070000000500000008000800028000000800020000008001"], 0x3f8}, 0x1}, 0x44000) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080)=0x42, 0x4) recvfrom(r0, &(0x7f0000000040)=""/2, 0x2, 0x0, &(0x7f0000000100)=@ll={0x11, 0x3, r2, 0x1, 0xfc60, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80) [ 247.354358] BTRFS error (device loop6): open_ctree failed [ 247.380740] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 247.387989] BTRFS error (device loop6): superblock checksum mismatch 03:09:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x4a}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r3, @in={{0x2, 0x4e20, @rand_addr=0x8}}, 0x3, 0x800000000000}, &(0x7f0000000240)=0x90) r4 = dup2(r0, r1) getsockname$packet(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000340)=0x14) setsockopt(r2, 0x9, 0x95c, &(0x7f00000004c0)="5fceefe5fe0c9c1772a7724cc93da42172ae4fdc1d2af904aa55137afb2e25fa8c4cd42c5849ea31a74ca3b1cce210972e35cf27c009976b56f6e5cc1b14aef8fffdab13e87b94ef680e3dc06cdfcc13ccac129db4aa898f4455300c04dffa3d5a3b4684e1302f56c15cb9f854b8f3d25364c5976dc348e6cbe84049ba5768666576f64689e978f687200f04ed2e6e03f92dd74ccabdd9b06e6aaf0b", 0x9c) sendmsg$nl_route_sched(r4, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=@getqdisc={0x0, 0x26, 0x2, 0x70bd2d, 0x25dfdbfd, {0x0, r5, {0xa}, {0xffee, 0x10}, {0xb8e25de0a44e5a20, 0xa}}, [{0x0, 0xa}, {0x0, 0xa}, {0x0, 0xa}, {0x0, 0xa}, {0x0, 0xa}, {0x0, 0xa}, {0x0, 0xa}]}, 0x2f1}, 0x1, 0x0, 0x0, 0x4000}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="a4010b0000dbbefc1e9caa6ff02b983700000000000000000000"]}) close(r2) close(r1) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x284000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r6, 0x28, 0x0, &(0x7f0000000080)=0x3, 0x8) [ 247.430428] BTRFS error (device loop6): open_ctree failed [ 247.450141] do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 03:09:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d", 0xcf, 0x10000}], 0x0, &(0x7f0000000240)) [ 247.512805] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 247.520158] BTRFS error (device loop6): superblock checksum mismatch [ 247.530680] do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 03:09:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x102, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:44 executing program 1: mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f000002cff6)='./control\x00', 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000040)='./control\x00', 0x0) renameat2(r1, &(0x7f0000bee000)='./control\x00', r0, &(0x7f000003a000)='./control\x00', 0x2) 03:09:44 executing program 7: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)={0xffffffffffffffff}) fcntl$setflags(r0, 0x2, 0x1) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x19) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x101, 0x7fff}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000200)={r2, @in={{0x2, 0x4e21, @rand_addr=0x6}}}, 0x84) r3 = syz_open_dev$sndctrl(&(0x7f0000001280)='/dev/snd/controlC#\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r4, 0x8b12, &(0x7f0000000100)="025cc83d6d345f8f762070") setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000300)=@assoc_value={r2, 0x4}, 0x8) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000001000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000)}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r4, 0x40405515, &(0x7f00000000c0)={0x2, 0x3, 0x156504fe, 0xffffffff, 'syz1\x00', 0x8}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc0045516, &(0x7f0000001000)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10000, 0x0) getsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f0000000040), 0x2) 03:09:44 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000440)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe2(&(0x7f0000000080), 0x80000) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x4, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000280)=0x90) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200002, 0x0) bind$vsock_dgram(r2, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x0}, 0x10) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) close(r0) [ 247.632544] BTRFS error (device loop6): open_ctree failed 03:09:44 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)=ANY=[]) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) pivot_root(&(0x7f0000000180)='./file1\x00', &(0x7f0000000200)='./file0/.il..\x00') r1 = dup2(r0, r0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) utimensat(r1, &(0x7f0000000300)='./file0/.il..\x00', &(0x7f0000000380)={{r2, r3/1000+10000}}, 0x100) r4 = getuid() fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f00000001c0)='./file0/.il..\x00', r4, r5) creat(&(0x7f0000000140)='./file1\x00', 0x0) [ 247.694098] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 247.701328] BTRFS error (device loop2): superblock checksum mismatch [ 247.766404] BTRFS error (device loop2): open_ctree failed [ 247.776689] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 247.783955] BTRFS error (device loop2): superblock checksum mismatch [ 247.855227] BTRFS error (device loop2): open_ctree failed 03:09:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="e5259c0ed944266201294f4cb2ac8cee77e3a543e36d877a19e9e2ab1975e52cceba1ab39fa2fccac352365919e214336fe26a6524aa2aa735a8b98f945b99a22858974c6db0ef17ced14924279f32586a5190b9d7b70d741669adb03f77d95fed82a860a3974d5df7fa28e8c363a6ec44") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_stats={0xf}}) close(r2) close(r1) 03:09:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318", 0xf1, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f00000000c0)=0x100000) 03:09:44 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCCBRK(r1, 0x5428) connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xc) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1e) 03:09:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d", 0xcf, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x102, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote={0xfe, 0x80, [], 0xbb}, 0x800, 0x0, 0xff, 0x1, 0x0, 0xcc, 0xfffffffffffffffc}, 0x20) socket$inet6(0xa, 0x3, 0x1) r2 = socket(0x9, 0x80000, 0x4) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) [ 248.227535] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 248.234802] BTRFS error (device loop6): superblock checksum mismatch [ 248.255512] BTRFS error (device loop6): open_ctree failed [ 248.264255] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 248.271478] BTRFS error (device loop6): superblock checksum mismatch 03:09:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) io_setup(0x10000, &(0x7f0000000080)) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(des3_ede))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f000048f000)="ad56b6c5824c8eb995298992ea54c7beef9f5d56530f90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000c2bfc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000007d000)="b3", 0x1}]) 03:09:45 executing program 1: r0 = socket(0x1e, 0x1, 0x0) getsockname(r0, &(0x7f0000000240)=@can={0x0, 0x0}, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'rose0\x00', r1}) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000892ff0)=@req={0x3fc}, 0x10) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004aeb5c)=@generic={0x10000000001e, "030000000000000000000401e526cc573c5bf86c483724c71e14dd6a739eff000848006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e2780000010007dc3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000bb0000), 0x0, &(0x7f0000477000), 0xd2}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) quotactl(0x7fff, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000001c0)="3325fccb9117f8fa41cbd907e668ec1733a34cef601eaa096e9a493f8c43384446f36a52459f0c8fe0851da88d29e78594d14b0e791b791374814e8017a9506b5bc5dfc056fde6fd6ab62a92d9817c8ba14da08be56e0c0251b1ac32619e76faf6bf532d39") membarrier(0x20, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000)=0xffff, 0x1) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="e000000052eb963d037ca3a43b1a41a446c4525c98a59f7b1c332259718f1ff82ed8da4ba70fb854eb85893267baca77c71244848db5d2e9ecf662e9f6828dc6c004d4900b595d5e8de2afce398bc926c53f26bf3b22bddbc7def75d94515f0b6d7dbfea51756f149b77915fd5e9cbd3cd72b83b9ecfeeffea643db6b115d6503c49580dae039f1577c481870fbdbe423a37ee8c10107baccf6a25a7b085cdf8aa4b0747b68c3772309a3d4c37dfa0acd226bae9dba93986ecbc4ee7e09d0be8cf28773cca3c99365a26276077d63c76c2c1694846630000000000000000000000000000"], &(0x7f0000000440)=0xe8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000480)={0x4, 0x1, 0xe, 0x10001, 0x2, 0x82, 0x8000, 0xb612, r3}, 0x20) 03:09:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318", 0xf1, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345e8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xaf2}) read(0xffffffffffffffff, &(0x7f00000001c0)=""/19, 0x13) [ 248.342613] BTRFS error (device loop6): open_ctree failed [ 248.372685] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 248.379950] BTRFS error (device loop6): superblock checksum mismatch 03:09:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x102, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x102, 0x10000}], 0x0, &(0x7f0000000240)) [ 248.481118] BTRFS error (device loop6): open_ctree failed [ 248.524809] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 248.532149] BTRFS error (device loop6): superblock checksum mismatch 03:09:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 248.565150] BTRFS error (device loop6): open_ctree failed [ 248.584366] print_req_error: I/O error, dev loop6, sector 128 [ 248.594871] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 248.602138] BTRFS error (device loop3): superblock checksum mismatch 03:09:45 executing program 4: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) seccomp(0x2, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x0, 0x3, 0x7}]}) 03:09:45 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000013000/0x3000)=nil, 0x3000}, 0x3}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) dup2(r1, r0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000604ffc)) dup2(r0, r2) [ 248.673549] BTRFS error (device loop3): open_ctree failed 03:09:45 executing program 0: mmap(&(0x7f0000000000/0xfd4000)=nil, 0xfd4000, 0x2000005, 0x40000000000031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfc1000)=nil, 0xfc1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fc1000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@acquire={0x400c630e}], 0x0, 0x0, &(0x7f00000000c0)}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='/dev/binder#\x00', r1}, 0x10) 03:09:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x280000, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@can, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000500)=""/4096, 0x1000}}, {{&(0x7f0000003540)=@l2, 0x80, &(0x7f0000003840)=[{&(0x7f0000003700)=""/209, 0xd1}], 0x1}}], 0x2, 0x0, &(0x7f0000003a80)={0x0, 0x1c9c380}) 03:09:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x102, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:09:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10b, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:45 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x28003, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x18) write$P9_RREAD(r0, &(0x7f0000000780)={0xf0, 0x75, 0x1, {0xe5, "dae8078448a13a74fccca48d9a04aa9f5724df2cc5230c9180a6a801f8058e85377fb950200f70950aa5fd5468c0b4be2b264fef4ae83e9dbc5127903c712621f1308679f6d4e616ad8b14e3f480474468c58701913da52340c4e7080dcda7abb3dbd41eb7b0b0bb16b498b563025ff51ba9c876ed34f9d57de5c2afbd5fa8e5681ae273049ff332b2824ac35673b71ac9456053fb21134706bb5c6e552d9f89c040562d2e2e8320869159a8ce4bd5f2430f8c69d62fa9cdc71846fe274bff7b05d06d251f5426d9b3a4b5e428c32aee6e4b775bbff8d8989397f187f7a0140a23c108db80"}}, 0xf0) inotify_rm_watch(r0, r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0xf9, "99d31d748afdeb31cad6af0c8c91ebc2daf89ea45c5fe316cac5d9ffcad7be2662b54fffddae30e0dda05526a7fc19e7f21812165fd241fc5ede7ee38ba73caffac2f52b343734ed42e2bb0dcb4fe78752dc55b3b6d211bee42919e8086ab251252681b2bdde75907dd20bfe17c5c679bc2f562f7ae5356d746e57f64943f14f3ebee8b772cf78cbd29b1c4e2b8ff68c4e1029b2506dfe9203c4634d4eb75265def3fb3ac574b3a70ce8cf3d5b86c059924bf0f591d3b64749eb619b5c3a6167cabf22cb5caadb14ef24bdb43becb49ae36ef1e9aeb9be31b9d9e07c630157a04453404ad5179f4d332afdecc80772778b4f3098ef9e71396c"}, &(0x7f0000000100)=0x101) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000001c0)={r3, 0x1e, "34043d7b1fc8ab19a71b4d716018a828e621303890d6d69a182e3805726f"}, &(0x7f0000000400)=0x26) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f00000005c0)) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f00000016c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0x80045301, &(0x7f0000000200)) sendto$inet(r2, &(0x7f00000004c0)="b768a8fa338b8b09442ea334ab1367621eef9696a8f3bb28c13ac2f9431cb35e5c519f7db653639568bb19ba6c31964b43c5aba04e56f2f4ee5436ac38fade358a15d5533db7a00707fbdf93d8f81e845ffc6daf55966dde9d5024957711ac9347b8baf6f844626a921938ac4379b4535332bb891299049e01001a48f2bd22b2517cf850c5cad00e9803e6dd6cb51b35f47b4228c2c78e99ef4cb61687822dc8c9444caa29017f18a5524855afc9d8fa794caa49e63970b5da0147e2bef0bb7a", 0xc0, 0x800, &(0x7f0000000580)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) 03:09:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xd608, 0x511002) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x100, 0x4, [0x7, 0x3ff, 0x786a, 0x1]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x81, 0x4, 0x0, 0x2, r2}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") recvfrom$packet(r0, &(0x7f0000000180)=""/155, 0x9b, 0x20, 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x8) [ 249.131208] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 249.138518] BTRFS error (device loop3): superblock checksum mismatch 03:09:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:09:45 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)='vboxnet1*bdev\x00', 0xfffffffffffffff9) keyctl$setperm(0x5, r0, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') bind$alg(r1, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0xac) r3 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000000), 0x447) [ 249.194327] binder: 11984:11985 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 249.222286] BTRFS error (device loop3): open_ctree failed [ 249.237363] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 249.244754] BTRFS error (device loop3): superblock checksum mismatch [ 249.252884] binder: 11984:11989 unknown command 0 [ 249.267849] binder: 11984:11989 ioctl c0306201 20a20000 returned -22 03:09:46 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"00ac730000000000ec973f820f7c4000", 0x102}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0xb02, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000440)={0x6, 0xb, 0x100000001, 0x4, "d9b7e4f789d57f31517a295bb34d0411e6f6b866c950270281b58eff5c780dc9"}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x101800, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x101000, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000200)={0xe67c01bbb65ae7e7, r3}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'ip6_vti0\x00', 0x400}) r4 = geteuid() fstat(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r4, r5) r6 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfff, 0x80000) ioctl$RTC_ALM_READ(r6, 0x80247008, &(0x7f0000000100)) sendmsg$rds(r3, &(0x7f0000000980)={&(0x7f0000000b40)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000280)=""/60, 0x3c}, {&(0x7f00000002c0)=""/123, 0x7b}, {&(0x7f0000000340)=""/180, 0xb4}, {&(0x7f0000000a80)=""/27, 0x1b}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/49, 0x31}, {&(0x7f0000000ac0)=""/109, 0x6d}, {&(0x7f00000009c0)=""/184, 0xb8}, {&(0x7f0000000600)=""/42, 0x348}, {&(0x7f0000000640)=""/2, 0x2}], 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000001401000002000000060000000600000030000000000000001401000003000000", @ANYPTR=&(0x7f0000000740)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="ac00000000000000", @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="4a0000000000000000140100000200000020000000ffffffff580000000000000014010000070000000500000001000100", @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB="ff0f000000000000"], @ANYPTR=&(0x7f0000000880)=ANY=[@ANYBLOB="7f00000000000000"], @ANYBLOB="010000000000000004000000000000000400000000000000040000000000000020000000000000000400000000000000"], 0xb8, 0x40800}, 0x8000) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'syzkaller0\x00', 0x600}) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000240)={0x6c6, 0xff68, 0x4}) [ 249.299675] BTRFS error (device loop3): open_ctree failed 03:09:46 executing program 7: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4040, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) socket$l2tp(0x18, 0x1, 0x1) r1 = socket(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x48842, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0x100000000000d000) ioctl$sock_ifreq(r1, 0x8929, &(0x7f00000000c0)={'gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 03:09:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f", 0x10b, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x102, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x104000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@deltaction={0x3c, 0x31, 0x500, 0x70bd25, 0x25dfdbfb, {0x0, 0x4, 0x1}, [@TCA_ACT_TAB={0x28, 0x1, [{0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3}}, {0x14, 0x18, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x94}, 0x200040d0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devtmpfs\x00', 0x0, &(0x7f00000002c0)="a45aeaa59fb83047707f734b515c0c6c5bb2ed415e5645d14ca79fef73ef5fa51586efcc6cfce314c77049e412de0edc1dc193fb9fab631415068d72dfe40302988cf36c25cbd0710377b56d0b465b4517dc2481bbee969d016edbbf37aa3d") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0x50, &(0x7f0000000200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r2, 0x4) 03:09:46 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)=ANY=[]) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) pivot_root(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file0/.il..\x00') creat(&(0x7f0000000140)='./file1\x00', 0x0) 03:09:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0xbbe1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0xf}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000002fe8)=[{0x7}, {0x6}]}, 0x10) [ 249.488298] FAT-fs (loop0): bogus number of reserved sectors [ 249.494295] FAT-fs (loop0): Can't find a valid FAT filesystem [ 249.524811] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 249.532129] BTRFS error (device loop6): superblock checksum mismatch 03:09:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 249.581589] BTRFS error (device loop6): open_ctree failed [ 249.584673] tmpfs: Bad mount option ¤Z꥟¸0GpsKQ\ l[²íA^VEÑL§Ÿïsï_¥†ïÌlüãÇpIäÞÜÁ“ûŸ«crß䘌ól%ËÐqwµm F[EÜ$»î–nÛ¿7ª [ 249.607184] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 249.614501] BTRFS error (device loop6): superblock checksum mismatch 03:09:46 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x101) clone(0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000180)) 03:09:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10b, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000200)="a0", 0x1, 0xfffffffffffffffc) r2 = dup2(r0, r0) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@xdp={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x80) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={@empty, @remote={0xfe, 0x80, [], 0xbb}, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x7, 0xfffffffffffffffd, 0x4, 0x500, 0x4, 0x80003, r3}) keyctl$restrict_keyring(0x4, r1, &(0x7f0000000140)='encrypted\x00', &(0x7f0000000300)='\x00') [ 249.742193] tmpfs: Bad mount option ¤Z꥟¸0GpsKQ\ l[²íA^VEÑL§Ÿïsï_¥†ïÌlüãÇpIäÞÜÁ“ûŸ«crß䘌ól%ËÐqwµm F[EÜ$»î–nÛ¿7ª [ 249.775428] BTRFS error (device loop6): open_ctree failed [ 249.833846] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 249.841138] BTRFS error (device loop6): superblock checksum mismatch [ 249.898683] BTRFS error (device loop6): open_ctree failed 03:09:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x4040ae9e, &(0x7f0000000240)={"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"}) 03:09:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f", 0x10b, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10b, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x3, 0xc) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x1000) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010407031dfffd946fa283000c200a0009000100041d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 03:09:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000900)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c200, 0x61) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f00000000c0)=0x1) 03:09:46 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'ip6_vti0\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000100)) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x4, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x181401, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 03:09:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10b, 0x10000}], 0x0, &(0x7f0000000240)) [ 250.130665] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 250.137961] BTRFS error (device loop6): superblock checksum mismatch [ 250.148166] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 250.157524] BTRFS error (device loop6): open_ctree failed [ 250.174839] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 250.182163] BTRFS error (device loop6): superblock checksum mismatch 03:09:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10b, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af4", 0x68, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0xa, 0x800, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="feffffffffffffff0000000000000000000000000800006f7abf0481a2f765db"]) ioctl(r1, 0x8916, &(0x7f0000000000)) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @rand_addr, @local}, &(0x7f00000000c0)=0xc) ioctl(r1, 0x8936, &(0x7f0000000000)) mkdir(&(0x7f0000000080)='./file0\x00', 0x100) 03:09:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8916, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000080)='\\vmnet0ppp1-#\x00', 0xfffffffffffffffd) 03:09:47 executing program 5: r0 = getpgid(0x0) ptrace$cont(0x19, r0, 0x125, 0x3) socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x81, 0xa0040) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r3, 0x6}, 0xffffffffffffffdd) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000100)) [ 250.263270] BTRFS error (device loop6): open_ctree failed [ 250.285749] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 250.293113] BTRFS error (device loop6): superblock checksum mismatch 03:09:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000800)={{&(0x7f00000006c0)=""/252, 0xfc}, &(0x7f00000007c0), 0x12}, 0x20) bind$rds(r0, &(0x7f00000000c0)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000200)=""/143, 0x8f}], 0x1, &(0x7f0000000f00)=ANY=[@ANYBLOB, @ANYPTR=&(0x7f0000000e80)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000ec0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00005480000000000000dd03e837000000000000030000000000000000000000f8ffffffffffffff0000000000000000"], 0x58}, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) getrlimit(0xb, &(0x7f0000000840)) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000140)) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000002c0)={"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"}) 03:09:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10f, 0x10000}], 0x0, &(0x7f0000000240)) [ 250.367932] BTRFS error (device loop6): open_ctree failed [ 250.385526] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 250.392914] BTRFS error (device loop6): superblock checksum mismatch 03:09:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10b, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000008000)={0x8, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) r2 = dup2(r1, r0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000100)={0x4, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) mprotect(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x7) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000), &(0x7f0000000000)=0x369) 03:09:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d085", 0x10f, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:47 executing program 5: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000300)) [ 250.505057] BTRFS error (device loop6): open_ctree failed [ 250.524308] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 2530879793048935964 transid 756082810144684242 /dev/loop6 03:09:47 executing program 0: clone(0x20020000, &(0x7f0000b6b000), &(0x7f0000000000), &(0x7f0000fef000), &(0x7f0000000000)) clone(0x0, &(0x7f0000000000), &(0x7f0000008000), &(0x7f0000000ffc), &(0x7f0000000000)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x341400) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000000c0)={0x3b, @broadcast=0xffffffff, 0x4e20, 0x0, 'fo\x00', 0x2, 0x2, 0x30}, 0x2c) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) prctl$intptr(0x24, 0xf91) [ 250.576100] BTRFS error (device loop2): superblock checksum mismatch 03:09:47 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = creat(&(0x7f0000000040)='./file0\x00', 0x114) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000080)) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6}, 0x14) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000100)={{0x7, 0x8f8c}, 'port1\x00', 0x20, 0x40002, 0x0, 0x1f, 0xe000000000000000, 0x6, 0x621, 0x0, 0x7, 0x8}) syz_emit_ethernet(0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaacaaaaaaaaaaaaaa0800450000280000000000009078e0000002e000000220000000418bc88f82dcaf6c274653fe9c77f116dd19dafb94b799a83a23aebebd57913f81b290292ba4453c0d3dc684c17377bf67b6591e28df280c888743165e74a611a51bf99e0e511df24e79edab3d87069078540986a18cc3c220030ba1c2835e936668d43033a23d2b4af512b0036bf11bf6db2384e356b6437ef6e944c926a05ca812da855e9900000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000007f00781600"], &(0x7f0000000240)) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000400)={"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"}) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000000c0)) 03:09:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8d", 0x1, 0x10000}], 0x0, &(0x7f0000000240)) [ 250.622883] BTRFS error (device loop2): open_ctree failed [ 250.657479] BTRFS error (device loop2): superblock checksum mismatch 03:09:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0xffffffff, 0x0, 0xff}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x67274813, 0x4, 0xf5, 0x7, r1}, 0x10) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x3, 0x404100) r3 = openat(r2, &(0x7f0000000180)='./file0\x00', 0x10000000800, 0x20) openat(r3, &(0x7f0000000040)='./file0/file0\x00', 0x40100, 0x45) r4 = creat(&(0x7f00000010c0)='./file0/file0\x00', 0x0) fchmod(r4, 0x0) [ 250.682723] BTRFS error (device loop2): open_ctree failed [ 250.711264] BTRFS error (device loop2): superblock checksum mismatch 03:09:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="000100000008000066000000c9030000ec000000010000000000000000000000002000000020000000010000000000006e5fbe5a0000ffff53ef01005ceb4fd2e515217e010000006e5fbe5a000000003e8b1a0826bb290000000001000000000000000b", 0x64, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="fc48abf79c6e16cf8cdcc6a3b393aa81e63121d1c983f21c6d7834d6a662c4c1752357dd5a8ca6c7aa24cba3f81d2837b5c2f8ff054531b3882bbfb7c1b708e86854d8e1eeebe40000000000000000"]) 03:09:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10f, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8d", 0x1, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d085", 0x10f, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:47 executing program 4: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000140), &(0x7f0000000180)=0x4) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x81) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f00001ec000/0x8000)=nil, 0x8000, 0x3, &(0x7f0000000080)=0xe23, 0x5, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000400)) [ 250.836975] BTRFS error (device loop2): open_ctree failed 03:09:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:09:47 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x305080, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f00000000c0)=0xffffffff, 0x4) r2 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote={0xfe, 0x80, [], 0xbb}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r2, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)=""/227, 0x66}], 0x1) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x88d9, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r2, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)=[{0xc}], 0xc}}], 0xb, 0x0) [ 250.908782] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 250.916086] BTRFS error (device loop7): superblock checksum mismatch [ 250.935835] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:09:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8d", 0x1, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10f, 0x10000}], 0x0, &(0x7f0000000240)) [ 251.005074] BTRFS error (device loop7): open_ctree failed [ 251.029620] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 251.036876] BTRFS error (device loop7): superblock checksum mismatch 03:09:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10f, 0x10000}], 0x0, &(0x7f0000000240)) [ 251.089955] BTRFS error (device loop7): open_ctree failed 03:09:47 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0xdad2, 0xca, 0x3, 0xa0000000, 0xfde, 0x2, 0x9, 0x3ff, 0xc68, 0x3, 0x81, 0x3}) ioctl$TCSETSF(r0, 0xc0046d00, &(0x7f0000000000)) 03:09:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000", 0x35, 0x10000}], 0x0, &(0x7f0000000240)) [ 251.154110] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 251.161389] BTRFS error (device loop3): superblock checksum mismatch [ 251.261535] BTRFS error (device loop3): open_ctree failed [ 251.283007] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 251.290379] BTRFS error (device loop3): superblock checksum mismatch [ 251.365889] BTRFS error (device loop3): open_ctree failed 03:09:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000", 0x35, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:48 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10f, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x10200, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="ca000000246164a06c73ee646c0d6b5499c6e64e0c475ffcc4ea7cc63abba052480be6f8775f753747c8e3f6d4d480c96826f53e1c5db50560e16295eb9ae6b4736b4a1c0567cd1e7b67b36abdc9fd21c2459c6587761a8e880b32bc794ce1f87a3294711ff9cb4b68180b25eb16447d635d3876893d86c405ae8063310afc392f0f883f4893e566201c0ccdacfc8d6b288dd0a43a370a12ff70427eb50781a48a5aa1c5f77282ec1f9c78d21d13effcf4407f65bc1bd91dec4de73632b5c7fee99f19a848b5ee107e3e42dc307237aba7473131178945952dbf356410"], &(0x7f0000000040)=0xd2) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={r1, 0x20000000000, 0x2, 0x6}, &(0x7f0000000280)=0x10) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000180)={'ipvs\x00'}, &(0x7f00000001c0)=0x1e) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x4d, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 03:09:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10f, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:48 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)="1f00000001021900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) r1 = getpgid(0xffffffffffffffff) ptrace$poke(0xffffffffffffffff, r1, &(0x7f0000000000), 0x0) 03:09:48 executing program 0: r0 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x4ab62d84, 0x40) r1 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x5, 0x100) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000240)=r1) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)={0x10000000}) socket$l2tp(0x18, 0x1, 0x1) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000180)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000012000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="3b0000004a0ba441f311d12cf700e6ec71f6f78a8e0e8a2fd2455d244cb635fba049ae7aed04b1a1c5258f01821fd4db45974b132e2550623724e0fee47e20"], &(0x7f0000000340)=0x43) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r4, 0x84, 0x78, &(0x7f0000000380)=r5, 0x4) pwrite64(r4, &(0x7f0000000080), 0x0, 0x0) dup2(r4, r2) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000140)={r6, 0x5}, 0x8) 03:09:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x10f, 0x10000}], 0x0, &(0x7f0000000240)) [ 251.629707] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 251.636998] BTRFS error (device loop6): superblock checksum mismatch 03:09:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000480)=ANY=[]) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x2000000000000004, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x210800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r1, 0x1, 0x70bd2c, 0x25dfdbff, {0xe}, [@IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000000000000}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x20004000) [ 251.712151] BTRFS error (device loop6): open_ctree failed [ 251.728592] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 251.735840] BTRFS error (device loop6): superblock checksum mismatch [ 251.772524] gfs2: not a GFS2 filesystem [ 251.781590] BTRFS error (device loop6): open_ctree failed [ 251.790783] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 251.798056] BTRFS error (device loop6): superblock checksum mismatch [ 251.806741] BTRFS error (device loop6): open_ctree failed [ 251.830123] gfs2: not a GFS2 filesystem 03:09:48 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000d28000)={0xaa}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000e4cfe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = getpid() sched_setaffinity(r2, 0x8, &(0x7f0000000000)=0x5) r3 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f0000013000)) readv(r3, &(0x7f000042bff8)=[{&(0x7f0000e3b000)=""/61, 0x4}], 0x1) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000ff0000)) dup3(r1, r0, 0x0) 03:09:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000", 0x35, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:48 executing program 5: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) fstat(r0, &(0x7f0000000140)) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000d70280bc3dfbf1a17209e9872ca4"], 0x0, 0x0, &(0x7f0000000080)}) 03:09:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x111, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:48 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x111, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000680)={@in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x88, 0x1, 0x200, "49428ff71f16984b9cd5f73279f3da596fe102493205f22302266e1e091669126c444c652836f3fa695a820e0087698a1c8d9c1d1ac6d55cf495729ace74c10558668a83bb120d6af87eb22a219888f1"}, 0x180) r1 = request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000180)="9900", 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000001c0)="2e665b86126a854a1324dbdf24d3ade8b58af91b387fe82c8cdfff6fe0cad4b6c047faa04fc63e7e88e069c0d5ac6eb5ab627d0f968180f603ba15eb322c5a16b5", 0xffffffffffffff4e, r1) keyctl$update(0x2, r2, 0x0, 0x0) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000040)=0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x101001, 0x0) ioctl$KDGKBDIACR(r5, 0x4b4a, &(0x7f0000000280)=""/76) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r4) 03:09:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 252.228571] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 2530879793048935964 transid 756082810144684242 /dev/loop6 [ 252.251969] print_req_error: I/O error, dev loop2, sector 128 03:09:49 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f000008f000/0x3000)=nil, 0x0, 0x0, 0x10, r0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x410000, 0x0) getdents(r1, &(0x7f0000001040)=""/4096, 0x1000) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='/dev/binder#\x00'}, 0x10) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000080)=0x3) accept4$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x0, @reserved=0x1}, 0x10, 0x80000) 03:09:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)="e2c38bcafc177f0054b9bc155a2f196a80952ca28e7952c987417af86ebf01f6acd79a1babd187c4ed5488de9330487c4f38cb62a4f273a4c8913001ba22c3a4253446b04ba627dbb36082fe509a4a7a5491a9e8d457f685b1b5835d45c5b7559f25e13296e9244bd852dc46b5a512ca765b9a84da000fdff0b98d3d2294f08540cd6f212a3ffa0e0795aa885ab18b3a21c5c800b02d2c87c8af893b81e5dc"}, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e23, 0x40, @remote={0xfe, 0x80, [], 0xbb}, 0xe41}, @in={0x2, 0x4e20}], 0x3c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000040)=0x6, 0x2) 03:09:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:09:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e", 0x4f, 0x10000}], 0x0, &(0x7f0000000240)) [ 252.282614] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 252.289865] BTRFS error (device loop3): superblock checksum mismatch [ 252.355313] BTRFS error (device loop3): open_ctree failed [ 252.382218] syz-executor1 uses obsolete (PF_INET,SOCK_PACKET) 03:09:49 executing program 5: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000100)) personality(0x1bb2baf3005ac137) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x20440, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x610003, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x1, 0x7, 0x3f, 0x5, 0x5, 0x3, 0x8001}, 0x1c) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000001, 0x11, r2, 0x0) 03:09:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 252.398782] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 252.406082] BTRFS error (device loop3): superblock checksum mismatch [ 252.457539] BTRFS error (device loop3): open_ctree failed [ 252.490712] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 252.497980] BTRFS error (device loop3): superblock checksum mismatch [ 252.515762] BTRFS error (device loop3): open_ctree failed 03:09:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df", 0x111, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:49 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='veth0_to_bond\x00') getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0xfffffffffffffd8f) [ 252.693227] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 252.700680] BTRFS error (device loop3): superblock checksum mismatch [ 252.744144] BTRFS error (device loop3): open_ctree failed 03:09:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0xffffffffffff2302}, 0x1) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8993, &(0x7f00000000c0)={'bond0\x00', &(0x7f0000000000)=ANY=[]}) close(r2) close(r1) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x7ff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x8cc, 0x4, 0x7fffffff, 0x0, r3}, &(0x7f0000000180)=0x10) 03:09:49 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x111, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:49 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000640)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{}, {}, {}, {}, {}, {0x0, 0x81}]}}) 03:09:49 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$fuse(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="18070004010000f806001661758b4f3952a48b9759436100000000e2cb03b7"], 0x18) ioctl$TCXONC(r0, 0x540a, 0xd6) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getdents64(r2, &(0x7f0000000100)=""/111, 0x20) 03:09:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:49 executing program 1: pause() mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000080)="045b898f73", 0x2800000, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f00000002c0)='.', &(0x7f0000000180)='cgroup\x00', 0x5010, &(0x7f0000000100)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000080)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000200)=0x4) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 03:09:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x111, 0x10000}], 0x0, &(0x7f0000000240)) [ 253.236620] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 253.243888] BTRFS error (device loop3): superblock checksum mismatch 03:09:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x99) ioctl(r0, 0x3, &(0x7f0000000140)="90e26643f4e1685da5080532895e9b62ef7e3dde20472192f9d5f0427d04145b7d177c77440fa90021a0c051ba506fb87ac7ee87d1ff39ae89ba50fb0cf0154295c337f54c7b56b75937d5e5863bc4fadbe6e3a9b8311c67970875e63f56d6ff75e47c7f8a46d516b65518b7") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x80000000) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x800c0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000400)=0x10001, 0x8) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) r4 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x112, 0x0, @thr={&(0x7f0000000040)="bf95c98924a9169daa9d5f93c592991cb6afb92be5e71db2c54d0ed94d13fa3b5e187fa94eac2de0cbeb51d784ae643005e9acf843cb112054b18c54e2caae295461245e99b75c493f8583b4d81f4c6951c14f8cf43693d5cdca25be14598876da4ee80de886dda8622a3eb39f1d4e0c0589a75cad2e80ad8be4c8cd490d7e0114d87fceb299187d404fa7a408e3811048e566ea52e5d2ad01dbce1796fef5d80799ac3410e352d6d0cdd5ed649cc2f314", &(0x7f00000002c0)="df0d10bfdca944c1111a7a29049aac5a56f683a60d683a17ba55f5450d977778ff8cf4e76b27b4247fa272623f3064a0be5e2dbd3c22a98d8874f93e98577e84feb77162a0549cebd694d7be7b5c1ad5d82e1e9b0e0a3c0d3da38f2327ea49764e247280fc7b37d94e1b0361e318b2d3242b29b57bc413b7bab803e132b6aa5d390936b69ec742c7caa29db8de7a8d9fb4e0ddf9092b53ad47815d417a14ee63855964888cbfa6aa1708cbbdd3ca88aeee9a3c53f2574508ac85fc2bf31ef98fafe1d4b6697aec247fda34bccaaa7e34dd4c1146fe29b88107ff5aeef5c7361b4e65b0f03336cda7c21154018842d72a"}}, &(0x7f00000001c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000240)={0x5}, 0x4) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1000000000016) 03:09:50 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 253.289437] BTRFS error (device loop3): open_ctree failed [ 253.310433] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 253.317676] BTRFS error (device loop3): superblock checksum mismatch 03:09:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x112, 0x10000}], 0x0, &(0x7f0000000240)) [ 253.384802] BTRFS error (device loop3): open_ctree failed 03:09:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:50 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x111, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:50 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90", 0x88, 0x10000}], 0x0, &(0x7f0000000240)) [ 253.505968] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 2530879793048935964 transid 756082810144684242 /dev/loop3 03:09:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f0000000240)) [ 253.563931] print_req_error: I/O error, dev loop2, sector 128 [ 253.592976] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 253.600243] BTRFS error (device loop3): superblock checksum mismatch [ 253.641734] BTRFS error (device loop3): open_ctree failed [ 253.661778] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 253.669120] BTRFS error (device loop3): superblock checksum mismatch [ 253.677353] BTRFS error (device loop3): open_ctree failed [ 253.695740] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 253.702933] BTRFS error (device loop3): superblock checksum mismatch [ 253.763012] BTRFS error (device loop3): open_ctree failed 03:09:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:50 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x112, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:50 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90", 0x88, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3b", 0x112, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/171, &(0x7f00000000c0)=0xab) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x126, 0x80) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2718, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) 03:09:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x111, 0x10000}], 0x0, &(0x7f0000000240)) [ 254.170881] print_req_error: I/O error, dev loop7, sector 128 [ 254.194737] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 254.201998] BTRFS error (device loop6): superblock checksum mismatch [ 254.225797] BTRFS error (device loop6): open_ctree failed [ 254.243925] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 254.251274] BTRFS error (device loop6): superblock checksum mismatch [ 254.300359] BTRFS error (device loop6): open_ctree failed [ 254.330767] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 254.338043] BTRFS error (device loop6): superblock checksum mismatch [ 254.379458] BTRFS error (device loop6): open_ctree failed 03:09:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x40107447, &(0x7f0000000000)=""/174) 03:09:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:54 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca90", 0x88, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r2, 0x1, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 03:09:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x112, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:54 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x112, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x111, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3b", 0x112, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:55 executing program 5: seccomp(0x1, 0x1, &(0x7f0000007ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x9}]}) 03:09:55 executing program 4: r0 = socket$inet6(0xa, 0xb, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000080)={0x70003}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000002c0)=[@text32={0x20, &(0x7f0000000180)="c744240000500000c74424020a000000c7442406000000000f011c240f0134120f20e035020000000f22e0e193ea2c010000e6000f00520ec4e1be5f7cd4a266ba400066b8f4ac66efdeb7eadb7cc866bad10466b8dd0566ef", 0x59}], 0x1, 0x22, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 258.424519] kauditd_printk_skb: 871 callbacks suppressed [ 258.424532] audit: type=1326 audit(1531364995.137:886): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12535 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x0 03:09:55 executing program 5: write(0xffffffffffffffff, &(0x7f0000000200)="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", 0xfc) socket(0x4000000d, 0xc, 0x9) [ 258.548897] audit: type=1326 audit(1531364995.172:887): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12535 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x0 [ 258.588211] print_req_error: I/O error, dev loop2, sector 128 03:09:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 258.606781] BTRFS error (device loop7): superblock checksum mismatch [ 258.643240] BTRFS error (device loop7): open_ctree failed 03:09:55 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000180)=@get={0x1, &(0x7f0000000000)=""/168, 0x7fe}) [ 258.678275] BTRFS error (device loop7): superblock checksum mismatch [ 258.692191] BTRFS error (device loop7): open_ctree failed [ 258.708324] BTRFS error (device loop7): superblock checksum mismatch 03:09:55 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) chroot(&(0x7f0000000080)='./file0\x00') bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffefffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000000c0)=@routing, 0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x400000, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x14090) 03:09:55 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee5", 0xcc, 0x10000}], 0x0, &(0x7f0000000240)) [ 258.728522] BTRFS error (device loop7): open_ctree failed 03:09:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113}], 0x0, &(0x7f0000000240)) [ 258.798233] BTRFS error (device loop7): superblock checksum mismatch [ 258.850957] BTRFS error (device loop7): open_ctree failed [ 258.892129] BTRFS error (device loop7): superblock checksum mismatch [ 258.958926] BTRFS error (device loop7): open_ctree failed 03:09:56 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x125d, &(0x7f0000000040)) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xfffffffffffffff9, 0x100) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000000c0)=0x5019, 0x4) 03:09:56 executing program 5: socketpair(0x2, 0x6, 0x755, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x1, 0x0, 0x3, 0x9}}) r1 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) fanotify_init(0x0, 0x40000) poll(&(0x7f0000000000)=[{r1}], 0x1, 0x6) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/191, 0xbf) 03:09:56 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x112, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:56 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee5", 0xcc, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113}], 0x0, &(0x7f0000000240)) 03:09:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x111, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00009f3fa8)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(arc4)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x4) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 260.080283] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 260.087552] BTRFS error (device loop6): superblock checksum mismatch 03:09:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113}], 0x0, &(0x7f0000000240)) 03:09:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:56 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee5", 0xcc, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee5", 0xcc, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x521400, 0x0) ioctl$RTC_UIE_OFF(r2, 0x7004) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000011000106000000000000ba080007000000", @ANYRES32=r1, @ANYBLOB="000000000000000008001a0000000200"], 0x28}, 0x1}, 0x0) [ 260.275553] BTRFS error (device loop6): open_ctree failed [ 260.285646] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 260.292914] BTRFS error (device loop6): superblock checksum mismatch 03:09:57 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5404, &(0x7f0000000000)) ioctl$KDGKBLED(r0, 0xc0045405, &(0x7f0000000080)) ioctl$TCSETS(r0, 0xc0045405, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x100000}) 03:09:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:57 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe", 0xee, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:57 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113}], 0x0, &(0x7f0000000240)) [ 260.377274] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 03:09:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000300)={'veth1_to_team\x00', {0x2, 0x4e22, @multicast2=0xe0000002}}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0xd9, "0cac9616090aeecc7f142385c87f8abace463595de33dbf81db5261e7b6060f3a6b1490608f6d6d132b6a74519745e90ec652c226d657fba5cbfd327973edc7eb5f37799eade329e60238726ddcedbeafe8a7884f1c24108e8f75c4a778efd2cb74f75a446f9eac537eab8828567f94a852c9cfaaf6c7d6a036d55720a85002657a8e0bd8a34b32cf81fd659a1b2ee3468d6ac1412ad7dc41c976646e61ddf4f530b5755a2675dee5dfd8ec213289831ba70ee198e4eb9d563d08a4b9f3188dbf880fe5b3174ae041633a598a50875f53fb686c89b92b20d44"}, &(0x7f0000000040)=0xe1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={r2, 0x6}, &(0x7f00000000c0)=0x8) [ 260.443447] BTRFS error (device loop6): open_ctree failed [ 260.491913] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 03:09:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:57 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='memory.high\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) io_setup(0x3ff, &(0x7f0000000380)=0x0) io_submit(r2, 0x1c2, &(0x7f0000000380)) sendfile(r1, r0, &(0x7f0000000040), 0x1) io_submit(r2, 0x0, &(0x7f0000000280)) [ 260.535011] BTRFS error (device loop0): unsupported checksum algorithm 3786 [ 260.542338] BTRFS error (device loop0): superblock checksum mismatch 03:09:57 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 260.626212] FAULT_INJECTION: forcing a failure. [ 260.626212] name failslab, interval 1, probability 0, space 0, times 1 [ 260.637588] CPU: 1 PID: 12686 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #142 [ 260.644996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.654409] Call Trace: [ 260.657033] dump_stack+0x1c9/0x2b4 [ 260.660668] ? dump_stack_print_info.cold.2+0x52/0x52 [ 260.665872] should_fail.cold.4+0xa/0x1a [ 260.669944] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 260.675048] ? lock_downgrade+0x8f0/0x8f0 [ 260.679199] ? proc_fail_nth_write+0x9e/0x210 [ 260.683694] ? proc_cwd_link+0x1d0/0x1d0 [ 260.687757] ? find_held_lock+0x36/0x1c0 [ 260.691818] ? check_same_owner+0x340/0x340 [ 260.696227] ? rcu_note_context_switch+0x730/0x730 [ 260.701151] __should_failslab+0x124/0x180 [ 260.705377] should_failslab+0x9/0x14 [ 260.709174] __kmalloc+0x2c8/0x760 [ 260.712719] ? strncpy_from_user+0x510/0x510 [ 260.717118] ? fput+0x130/0x1a0 [ 260.720411] ? __x64_sys_memfd_create+0x142/0x4f0 [ 260.725259] __x64_sys_memfd_create+0x142/0x4f0 [ 260.729946] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 260.735481] ? memfd_fcntl+0x1400/0x1400 [ 260.739543] ? do_syscall_64+0x9a/0x820 [ 260.743508] do_syscall_64+0x1b9/0x820 [ 260.747393] ? syscall_return_slowpath+0x5e0/0x5e0 [ 260.752310] ? syscall_return_slowpath+0x31d/0x5e0 [ 260.757247] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 260.762614] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.767451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.772642] RIP: 0033:0x455e29 [ 260.775818] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.795107] RSP: 002b:00007f83bbce7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 260.802813] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 260.810078] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 260.817335] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 03:09:57 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113}], 0x0, &(0x7f0000000240)) 03:09:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:09:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket(0xa, 0x20000000001, 0x0) listen(r1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='fdinfo/3\x00') r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp6\x00') preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000500)=""/164, 0xa4}, {&(0x7f0000000300)=""/248, 0xf8}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x7, 0x200, 0x40, 0x100000001, 0x0, 0x2, 0xa3f1, 0x0}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r4, 0x5, 0x30}, 0xc) 03:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_procfs(0x0, &(0x7f0000000180)='gid_map\x00') vmsplice(r0, &(0x7f00000008c0)=[{&(0x7f0000000000)="a47a977ad7a59e38cbca6b2f2c749ac6271f188e035764010cb5b03fcbb8aa876493e6388bc405f661cc40e4973830143a1e1d6e085560f021c1da62fa5de4e82e846ababfef947c124bffee434133e5ddfac074f3118d82a41c97f57dc0f647ca434638f4ca14f193a2ff382c53014e9c1f2c47062b1d639c162ee564cf3b2c529b19c6484e0b997f0f11c22e9f015020987a6835d0b83bdb41dac897dc2d09c10f", 0xa2}, {&(0x7f00000000c0)="071f0d1f730a28237301bd5fc87415134ae733d4c0f6b4eeba7781fc1a1785a1409f1a12161cd30f27e85c6dcdd794602176530161845737011daab08077391e5a2330675f264f97a5bec12cf1dfd97196409ffbda238674143820bf9fb1a7781b4bcb", 0x63}, {&(0x7f00000002c0)="b841f065ef0aabe0c60e87ff17720d5af609663d340a454f82d1a4c9251d2c02bde2dcc6936833c3e579c3fed6b7ffd709a162d268c3e897ef4983f2959d2011b1bd716bb1cf322592a6611e7e2b4c79686eaa9711f46d3caa4be5ca3668bd9eb60794cc72e396856be872cb1ded905b9c8c878fe2ada2ed3d2533020e3cccd382391aebf064735669e3c84317ea726d4c640a7d925d19a1eaabb1d7a65444cdc6ae3aaf1791b482a998d60c1cf08de00cc4f635f3ce4b68d1cf70f06fe3f3757eb846c0464eca02f3e40c633bff3f8779cb5c087ad5d28df26e8255d18699c4aa", 0xe1}, {&(0x7f00000003c0)="ac4fc960fbca13d8954df4ac172fd1c9138a8ec882023315cdd0e4eade411911a18774a414f876f859620044767d3b61bba2bc271d7d435fa6bac8acbd6b1c73b06bb630e52362a042879c6f25a2ddefe86f2702467c271a3d187e459c27d20130b5c1c0eafd401ff3edf27b62f237bcc2885473adbc0c7d06bcb7f616e5979a1f32d81c8d54384e3c2e3875724ef5d34d76fa472a6ca47437d1144f5d9c8123bfc0f6e8c00bac2e8862fe5d8dade43377cfd993f8c124a2b8d794fcbe6c3aa74cb1783b14615e9fc36528f96164bb2bfaa65e5bf8c9e18ca0200e832fdf45", 0xdf}, {&(0x7f00000001c0)="36426b6b9418d69b0ed38009a4641c15fc72a1651cba2c5a6fd57e4e983bf9fc09cbf56b085ba4530d0d62da9f73b3bcda598b70762e1af8a26d67b73f5345cbd1ea563c98167dfd00a5", 0x4a}, {&(0x7f00000004c0)="932fd38922848fbc9a99b797737517614a8d634a170f89ffb1dd64d5fabb293114a31d905b1b36a71f41bdc473effb96753a83adaa9c19e120eebe5add145968229ce63a5074607192755c6bbf82d434a4e29cabcd343439bb440c9479c911ec204bd4cf2977289e5ff801745a5b3a32552abc66b5a9bd2ca330a24aefd0eb59feff538b83a98dd7098e9ec426830f0e4a1f4fe54702ff259e234220e3240e642c17d2b9411eb5e5604628d52b22c7af69f8879dde3ce4c7e13cada98eb16a20bb67d5d3f8d930a890c71be4d8daa60242be4f0d7a70c90a49e4fd4444e242cb", 0xe0}, {&(0x7f00000005c0)="b88c59236cdf17ba324aa852da2889d922ca4d8fdc34084c3a37e8304e747b358839991c52280b0806ece0f31b2399d9f01ad8ec8782a0a7fdf397b3fc902ca695dd20ea9d7c6d3432365c9380d44df44f6c5abb1701bbf7d70bb820062b673e4d0e3c721e1c1436bb8e3fc7f39a82333d6eaef48958e88acfbf6b03f85270069d3e67f451b17d1aeac75d25877c0893fc40855a5c4b01ff3b8810c981dd1044122c8e", 0xa3}, {&(0x7f0000000680)="3a54bd6ebbc9346c132b002f094d43948a1828828bb7a2e5014607e1d83abaafbb321b2afed7da3bf4fbc73604925dac0a1eaf83570da19415a53c45fe972567516b55737fbedd0f06a1de2795c9e0993b54bf507de3356854e676351fe70d688b2feb9dd5d841a0af055af06a059537cd3eb67d9773a2b33fe3b4d4c928a987a51694ec5b466b5f2dba6d7fbf7b0488e640e2a415bf60fdbf88b6efed8d7952a33ccd016dc8160195cc26a39ea81556a5d711884043be6e1f4700b02ac6e62b8d2fd6f07a7820d7457ead091ef893aeb6329233bb34e4a786c955bd5ff33eb124f29f224335836542dfd350b44ef1f4", 0xf0}, {&(0x7f0000000780)="e1f0e48287569b202624585cbc027b8dbec4af780c60f61794f2bcc8a799112812184bcf229d8faf123a7f7dadb526007493410d8bd68ae3e2b2ae0c6ef46b003eb0a3c8e9c75b40d096607cbafb0b032023deb347d3e94061a3fba755520a810e9f634fa9360e05f46aab3f57b8a2caf3837601f244b373365b7c21e63307ae710c81f9e7a5ccc7d8143189bb7b97", 0x8f}, {&(0x7f0000000840)="8ba9b93a511d376b52b2060d7068e1c43e7b0db08b1b958f407898abad19ae5bc67cef6663407dd7c36a5d57849b883a11464f0be2b43985b3fdc114f56d600a5c30921de6f7f96acafeb9a21b34da690dd8aac695527b06e6a33b4abbbabe397e14af4f0841", 0x66}], 0xa, 0x1) lseek(r1, 0xfffffffffffd, 0x0) 03:09:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) [ 260.824604] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 260.831872] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000000 03:09:57 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:57 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113}], 0x0, &(0x7f0000000240)) 03:09:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x2003}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000499e", @ANYBLOB="030000000000000008001b00000000005966c44297f32668049dbef0d704000000979dc63fe12283c57d9c08c4fb11c8671ec45a729aaab61a2fc5d7d34435fed53b0f751826ec8be3da872eeeb815e3661ae37866b8609566ca02508a24ccb0dcaccf3c6dac"], 0x2}, 0x1}, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) dup2(r3, r0) 03:09:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/icmp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/169, 0xa9}], 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) set_thread_area(&(0x7f0000000040)={0x80, 0x20001000, 0x4000, 0x7, 0x9ac, 0xc56b, 0x8, 0x8, 0x7, 0x3f}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xffff}], 0x1) connect$inet(r1, &(0x7f00000000c0)={0x2}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}], 0x2217) [ 260.964264] BTRFS error (device loop0): open_ctree failed 03:09:57 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e21, 0x101, @dev={0xfe, 0x80, [], 0x1b}, 0xfff}}}, 0x84) sendto$inet(r1, &(0x7f0000000000)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r1, 0x1) unshare(0x2000400) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0), &(0x7f0000000100)=0x18) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000002c0)={0x0, 0x5, 0x58a, 0x2, 0x200, 0x5, 0x8001, 0x4, 0x7fffffff, 0x9b, 0xfffffffffffffffc}, 0xb) 03:09:57 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539", 0xcd, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 261.198185] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 971333148 transid 756082810144684242 /dev/loop7 [ 261.230626] FAULT_INJECTION: forcing a failure. [ 261.230626] name failslab, interval 1, probability 0, space 0, times 0 [ 261.241996] CPU: 0 PID: 12749 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #142 [ 261.249378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.258767] Call Trace: [ 261.261375] dump_stack+0x1c9/0x2b4 [ 261.265022] ? dump_stack_print_info.cold.2+0x52/0x52 [ 261.270227] ? print_usage_bug+0xc0/0xc0 [ 261.274311] should_fail.cold.4+0xa/0x1a [ 261.278404] ? trace_hardirqs_on+0x10/0x10 [ 261.282648] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 261.287785] ? find_held_lock+0x36/0x1c0 [ 261.291867] ? find_held_lock+0x36/0x1c0 [ 261.295959] ? check_same_owner+0x340/0x340 [ 261.300295] ? rcu_note_context_switch+0x730/0x730 [ 261.305265] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 261.310295] __should_failslab+0x124/0x180 [ 261.314546] should_failslab+0x9/0x14 [ 261.318383] kmem_cache_alloc+0x2af/0x760 [ 261.322554] __d_alloc+0xc8/0xd50 [ 261.326025] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 261.331078] ? do_raw_spin_unlock+0xa7/0x2f0 [ 261.335498] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 261.340100] ? __lock_is_held+0xb5/0x140 [ 261.344188] ? _raw_spin_unlock+0x22/0x30 [ 261.348343] ? __alloc_fd+0x34e/0x710 [ 261.352183] ? exit_files+0xb0/0xb0 [ 261.355833] d_alloc_pseudo+0x1d/0x30 [ 261.359670] __shmem_file_setup+0x1f3/0x700 [ 261.364006] ? check_same_owner+0x340/0x340 [ 261.368344] ? shmem_fill_super+0xa50/0xa50 [ 261.372676] ? get_unused_fd_flags+0x122/0x1a0 [ 261.377264] ? __alloc_fd+0x710/0x710 [ 261.381088] shmem_file_setup+0x2f/0x40 [ 261.385081] __x64_sys_memfd_create+0x2af/0x4f0 [ 261.389767] ? memfd_fcntl+0x1400/0x1400 [ 261.393852] ? do_syscall_64+0x9a/0x820 [ 261.397894] do_syscall_64+0x1b9/0x820 [ 261.401819] ? finish_task_switch+0x1d3/0x870 [ 261.406345] ? syscall_return_slowpath+0x5e0/0x5e0 [ 261.411339] ? syscall_return_slowpath+0x31d/0x5e0 [ 261.416286] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 261.421656] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.426500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.431678] RIP: 0033:0x455e29 03:09:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe", 0xee, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:58 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x2, 0x400) r3 = socket(0x19, 0x5, 0x41) getsockopt$inet6_buf(r3, 0x29, 0xca, &(0x7f0000000080)=""/114, &(0x7f0000000000)=0x72) connect$inet(r1, &(0x7f0000000200)={0x2}, 0x10) ioctl$RTC_WIE_ON(r2, 0x700f) dup2(r0, r0) 03:09:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x100, 0xff1f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendto$inet6(r1, &(0x7f0000000500)="0404000000c000ddb8460900fff55b4202938207d9fb3780398d5375000000007929301ee616d5c01843e06590080053c0e385472da7222a2bb42f2dbd94c3b50035060f118d0000f55dc62600000200000000000000804af04600000000aeb462644a4bae1356642490a7b5fc88046afd77fc7ae664f65b9d5a3e5a89ad4fc0dbf83c56d97e6b7aba8691521ab9b14777b38587b97dfad506adee3bc640111f", 0xa0, 0x0, &(0x7f00000004c0)={0xa, 0x200800800, 0x20000000005, @mcast1={0xff, 0x1, [], 0x1}}, 0xff09) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8080, 0x0) 03:09:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:09:58 executing program 6 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 261.434851] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.454090] RSP: 002b:00007f83bbce7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 261.461787] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 261.469064] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 261.476331] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 261.483587] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 261.490840] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000001 [ 261.536792] FAULT_INJECTION: forcing a failure. [ 261.536792] name failslab, interval 1, probability 0, space 0, times 0 [ 261.548122] CPU: 0 PID: 12775 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #142 [ 261.555522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.564892] Call Trace: [ 261.567507] dump_stack+0x1c9/0x2b4 [ 261.571159] ? dump_stack_print_info.cold.2+0x52/0x52 [ 261.576384] should_fail.cold.4+0xa/0x1a [ 261.580469] ? fault_create_debugfs_attr+0x1f0/0x1f0 03:09:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x400, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = getpgid(0x0) ptrace$cont(0x3f, r2, 0x0, 0x1) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000100)={0x0, 0x2000000001, 0x2, &(0x7f0000000080)=0x80ffff}) 03:09:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 261.585594] ? lock_downgrade+0x8f0/0x8f0 [ 261.589763] ? proc_fail_nth_write+0x9e/0x210 [ 261.594272] ? proc_cwd_link+0x1d0/0x1d0 [ 261.598328] ? find_held_lock+0x36/0x1c0 [ 261.602391] ? check_same_owner+0x340/0x340 [ 261.606717] ? rcu_note_context_switch+0x730/0x730 [ 261.611653] __should_failslab+0x124/0x180 [ 261.615880] should_failslab+0x9/0x14 [ 261.619666] __kmalloc+0x2c8/0x760 [ 261.623197] ? strncpy_from_user+0x510/0x510 [ 261.627606] ? fput+0x130/0x1a0 [ 261.630888] ? __x64_sys_memfd_create+0x142/0x4f0 [ 261.635734] __x64_sys_memfd_create+0x142/0x4f0 [ 261.640394] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 261.645929] ? memfd_fcntl+0x1400/0x1400 [ 261.649982] ? do_syscall_64+0x9a/0x820 [ 261.653959] do_syscall_64+0x1b9/0x820 [ 261.657846] ? finish_task_switch+0x1d3/0x870 [ 261.662328] ? syscall_return_slowpath+0x5e0/0x5e0 [ 261.667330] ? syscall_return_slowpath+0x31d/0x5e0 [ 261.672253] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 261.677697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.682541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.687716] RIP: 0033:0x455e29 [ 261.690898] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.710178] RSP: 002b:00007f01eda57a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 261.717877] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 261.725146] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 261.732403] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 261.739661] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 261.746916] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000000 [ 261.756494] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 261.763871] BTRFS error (device loop7): superblock checksum mismatch [ 261.774454] BTRFS error (device loop7): open_ctree failed 03:09:58 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:58 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000000), 0x2c3) ioctl$TCSETSF(r0, 0x5100, &(0x7f0000000100)={0x0, 0xc, 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3, 0x10000, 0x0, 0xfffffffffffffffc}) 03:09:58 executing program 6 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000100)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'gretap0\x00', r3}) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x30, r2, 0x1, 0x0, 0x0, {0x6}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1}]}]}, 0x30}, 0x1}, 0x0) [ 261.819478] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 261.826796] BTRFS error (device loop7): superblock checksum mismatch [ 261.879286] FAULT_INJECTION: forcing a failure. [ 261.879286] name failslab, interval 1, probability 0, space 0, times 0 [ 261.890704] CPU: 0 PID: 12791 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #142 [ 261.898083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.899656] netlink: 'syz-executor1': attribute type 4 has an invalid length. [ 261.907462] Call Trace: [ 261.907496] dump_stack+0x1c9/0x2b4 [ 261.907513] ? dump_stack_print_info.cold.2+0x52/0x52 [ 261.907535] ? print_usage_bug+0xc0/0xc0 [ 261.907560] should_fail.cold.4+0xa/0x1a [ 261.907575] ? trace_hardirqs_on+0x10/0x10 [ 261.907590] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 261.907608] ? find_held_lock+0x36/0x1c0 [ 261.915078] netlink: 'syz-executor1': attribute type 2 has an invalid length. [ 261.917494] ? find_held_lock+0x36/0x1c0 [ 261.917531] ? check_same_owner+0x340/0x340 [ 261.921179] netlink: 'syz-executor1': attribute type 1 has an invalid length. [ 261.926339] ? rcu_note_context_switch+0x730/0x730 [ 261.926358] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 261.926378] __should_failslab+0x124/0x180 [ 261.926403] should_failslab+0x9/0x14 [ 261.955635] FAULT_INJECTION: forcing a failure. [ 261.955635] name failslab, interval 1, probability 0, space 0, times 0 [ 261.959230] kmem_cache_alloc+0x2af/0x760 [ 261.959255] __d_alloc+0xc8/0xd50 [ 261.959275] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 261.959290] ? do_raw_spin_unlock+0xa7/0x2f0 [ 261.959303] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 261.959326] ? __lock_is_held+0xb5/0x140 [ 262.025602] ? _raw_spin_unlock+0x22/0x30 [ 262.029750] ? __alloc_fd+0x34e/0x710 [ 262.033555] ? exit_files+0xb0/0xb0 [ 262.037183] d_alloc_pseudo+0x1d/0x30 [ 262.040985] __shmem_file_setup+0x1f3/0x700 [ 262.045303] ? check_same_owner+0x340/0x340 [ 262.049640] ? shmem_fill_super+0xa50/0xa50 [ 262.053960] ? get_unused_fd_flags+0x122/0x1a0 [ 262.058631] ? __alloc_fd+0x710/0x710 [ 262.062526] shmem_file_setup+0x2f/0x40 [ 262.066515] __x64_sys_memfd_create+0x2af/0x4f0 [ 262.071182] ? memfd_fcntl+0x1400/0x1400 [ 262.075240] ? do_syscall_64+0x9a/0x820 [ 262.079212] do_syscall_64+0x1b9/0x820 [ 262.083107] ? finish_task_switch+0x1d3/0x870 [ 262.087613] ? syscall_return_slowpath+0x5e0/0x5e0 [ 262.092549] ? syscall_return_slowpath+0x31d/0x5e0 [ 262.097479] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 262.102843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.107686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.112883] RIP: 0033:0x455e29 [ 262.116061] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.135373] RSP: 002b:00007f01eda57a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 262.143079] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 262.150341] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 262.157602] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 262.164865] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 262.172128] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000001 [ 262.179412] CPU: 1 PID: 12795 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #142 [ 262.186810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.196179] Call Trace: [ 262.198793] dump_stack+0x1c9/0x2b4 [ 262.202423] ? dump_stack_print_info.cold.2+0x52/0x52 [ 262.207606] ? __kernel_text_address+0xd/0x40 [ 262.212095] should_fail.cold.4+0xa/0x1a [ 262.216157] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.221263] ? save_stack+0xa9/0xd0 [ 262.224890] ? save_stack+0x43/0xd0 [ 262.228502] ? kasan_kmalloc+0xc4/0xe0 [ 262.232377] ? kasan_slab_alloc+0x12/0x20 [ 262.236511] ? kmem_cache_alloc+0x12e/0x760 [ 262.240831] ? __d_alloc+0xc8/0xd50 [ 262.244453] ? d_alloc_pseudo+0x1d/0x30 [ 262.248415] ? __shmem_file_setup+0x1f3/0x700 [ 262.252895] ? shmem_file_setup+0x2f/0x40 [ 262.257037] ? find_held_lock+0x36/0x1c0 [ 262.261109] ? check_same_owner+0x340/0x340 [ 262.265421] ? rcu_note_context_switch+0x730/0x730 [ 262.270346] ? kasan_check_read+0x11/0x20 [ 262.274493] __should_failslab+0x124/0x180 [ 262.278733] should_failslab+0x9/0x14 [ 262.282517] kmem_cache_alloc+0x2af/0x760 [ 262.286665] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.291667] ? kmem_cache_alloc+0x5fa/0x760 [ 262.295988] ? shmem_destroy_callback+0xc0/0xc0 [ 262.300649] shmem_alloc_inode+0x1b/0x40 [ 262.304698] alloc_inode+0x63/0x190 [ 262.308313] new_inode_pseudo+0x71/0x1a0 [ 262.312373] ? prune_icache_sb+0x1b0/0x1b0 [ 262.316609] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 262.321624] new_inode+0x1c/0x40 [ 262.324979] shmem_get_inode+0xf1/0x910 [ 262.328956] ? shmem_encode_fh+0x340/0x340 [ 262.333181] ? _raw_spin_unlock+0x22/0x30 [ 262.337316] ? __alloc_fd+0x34e/0x710 [ 262.341105] ? exit_files+0xb0/0xb0 [ 262.344724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.350267] __shmem_file_setup+0x259/0x700 [ 262.354588] ? check_same_owner+0x340/0x340 [ 262.358911] ? shmem_fill_super+0xa50/0xa50 [ 262.363223] ? get_unused_fd_flags+0x122/0x1a0 [ 262.367809] ? __alloc_fd+0x710/0x710 [ 262.371616] shmem_file_setup+0x2f/0x40 [ 262.376457] __x64_sys_memfd_create+0x2af/0x4f0 [ 262.381122] ? memfd_fcntl+0x1400/0x1400 [ 262.385172] ? do_syscall_64+0x9a/0x820 [ 262.389146] do_syscall_64+0x1b9/0x820 [ 262.393024] ? finish_task_switch+0x1d3/0x870 [ 262.397518] ? syscall_return_slowpath+0x5e0/0x5e0 [ 262.402435] ? syscall_return_slowpath+0x31d/0x5e0 [ 262.407368] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 262.412738] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.417572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.422751] RIP: 0033:0x455e29 [ 262.425924] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.445162] RSP: 002b:00007f83bbce7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 262.452861] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 262.460116] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 262.467371] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 262.474639] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 262.481896] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000002 [ 262.547629] netlink: 'syz-executor1': attribute type 4 has an invalid length. [ 262.555092] netlink: 'syz-executor1': attribute type 2 has an invalid length. [ 262.562442] netlink: 'syz-executor1': attribute type 1 has an invalid length. [ 262.580938] BTRFS error (device loop7): open_ctree failed 03:09:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@mcast1={0xff, 0x1, [], 0x1}}, 0x39) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x40000) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000040)={0xdd, @rand_addr=0x3, 0x4e24, 0x0, 'nq\x00', 0x25, 0xd31, 0x6a}, 0x2c) 03:09:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:59 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539", 0xcd, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000640)={0x14, 0x18, 0xfffffffffffffffd, 0x0, 0x0, {0x7592da1c}}, 0x14}, 0x1}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) ptrace$setregs(0xd, r1, 0x8, &(0x7f0000000200)="3babc31970b1810ac941ba54e9af469cbfccd793a82ec8c416d620fbd270007d70e03a93fca34f28b75cbf60ff1e6771c84c9cdab8f829046f00589043879296e8d8c707e324b6a60b7efe3c1ef0c8f3bbd3e436ca5fbda2463c4ec9982b7b44654684b2333a0cb47049e0ebfe77ad33fac595d6be647be945322542fbe103163833617acdeaf0fc4c7beaa0b8ee6c7eef64571eb2aa695569ac6b") 03:09:59 executing program 6 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:59 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:09:59 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x2, 0x7, 0x8000, 0x8, 0x7}) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x42, 0x4, 0x2}, 0x79}}, 0x18) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x7) 03:09:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 262.699303] FAULT_INJECTION: forcing a failure. [ 262.699303] name failslab, interval 1, probability 0, space 0, times 0 [ 262.703553] FAULT_INJECTION: forcing a failure. [ 262.703553] name failslab, interval 1, probability 0, space 0, times 0 [ 262.710635] CPU: 1 PID: 12815 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #142 [ 262.729192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.738550] Call Trace: [ 262.741143] dump_stack+0x1c9/0x2b4 [ 262.744775] ? dump_stack_print_info.cold.2+0x52/0x52 [ 262.749963] ? __kernel_text_address+0xd/0x40 [ 262.754463] should_fail.cold.4+0xa/0x1a [ 262.758523] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.763624] ? save_stack+0xa9/0xd0 [ 262.767256] ? save_stack+0x43/0xd0 [ 262.770878] ? kasan_kmalloc+0xc4/0xe0 [ 262.774756] ? kasan_slab_alloc+0x12/0x20 [ 262.778900] ? kmem_cache_alloc+0x12e/0x760 [ 262.783223] ? __d_alloc+0xc8/0xd50 [ 262.786841] ? d_alloc_pseudo+0x1d/0x30 [ 262.790808] ? __shmem_file_setup+0x1f3/0x700 [ 262.795295] ? shmem_file_setup+0x2f/0x40 [ 262.799445] ? find_held_lock+0x36/0x1c0 [ 262.803516] ? check_same_owner+0x340/0x340 [ 262.807836] ? rcu_note_context_switch+0x730/0x730 [ 262.812776] ? kasan_check_read+0x11/0x20 [ 262.816923] __should_failslab+0x124/0x180 [ 262.821156] should_failslab+0x9/0x14 [ 262.824953] kmem_cache_alloc+0x2af/0x760 [ 262.829098] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.834107] ? kmem_cache_alloc+0x5fa/0x760 [ 262.838424] ? shmem_destroy_callback+0xc0/0xc0 [ 262.843088] shmem_alloc_inode+0x1b/0x40 [ 262.847147] alloc_inode+0x63/0x190 [ 262.850771] new_inode_pseudo+0x71/0x1a0 [ 262.854826] ? prune_icache_sb+0x1b0/0x1b0 [ 262.859060] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 262.864075] new_inode+0x1c/0x40 [ 262.867438] shmem_get_inode+0xf1/0x910 [ 262.871413] ? shmem_encode_fh+0x340/0x340 [ 262.875647] ? _raw_spin_unlock+0x22/0x30 [ 262.879790] ? __alloc_fd+0x34e/0x710 [ 262.883592] ? exit_files+0xb0/0xb0 [ 262.887221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.892757] __shmem_file_setup+0x259/0x700 [ 262.897071] ? check_same_owner+0x340/0x340 [ 262.901388] ? shmem_fill_super+0xa50/0xa50 [ 262.905704] ? get_unused_fd_flags+0x122/0x1a0 [ 262.910281] ? __alloc_fd+0x710/0x710 [ 262.914110] shmem_file_setup+0x2f/0x40 [ 262.918087] __x64_sys_memfd_create+0x2af/0x4f0 [ 262.922765] ? memfd_fcntl+0x1400/0x1400 [ 262.926821] ? do_syscall_64+0x9a/0x820 [ 262.930795] do_syscall_64+0x1b9/0x820 [ 262.934677] ? finish_task_switch+0x1d3/0x870 [ 262.939168] ? syscall_return_slowpath+0x5e0/0x5e0 [ 262.944094] ? syscall_return_slowpath+0x31d/0x5e0 [ 262.949028] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 262.954391] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.959237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.964418] RIP: 0033:0x455e29 [ 262.967595] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.986906] RSP: 002b:00007f01eda57a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 262.994610] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 263.001876] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 263.009137] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 263.016397] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 263.025605] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000002 [ 263.032888] CPU: 0 PID: 12818 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #142 [ 263.040294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.049660] Call Trace: [ 263.052266] dump_stack+0x1c9/0x2b4 [ 263.055898] ? dump_stack_print_info.cold.2+0x52/0x52 [ 263.061088] ? __lock_acquire+0x7fc/0x5020 [ 263.065324] should_fail.cold.4+0xa/0x1a [ 263.069493] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.074592] ? find_held_lock+0x36/0x1c0 [ 263.078652] ? graph_lock+0x170/0x170 [ 263.082457] ? find_held_lock+0x36/0x1c0 [ 263.086537] ? check_same_owner+0x340/0x340 [ 263.090865] ? graph_lock+0x170/0x170 [ 263.094658] ? rcu_note_context_switch+0x730/0x730 [ 263.099580] ? kasan_check_read+0x11/0x20 [ 263.103721] __should_failslab+0x124/0x180 [ 263.107960] should_failslab+0x9/0x14 [ 263.111752] kmem_cache_alloc+0x2af/0x760 [ 263.115910] ? find_held_lock+0x36/0x1c0 [ 263.119979] get_empty_filp+0x12d/0x530 [ 263.123955] ? proc_nr_files+0x60/0x60 [ 263.127853] ? kasan_check_read+0x11/0x20 [ 263.132004] ? do_raw_spin_unlock+0xa7/0x2f0 [ 263.136415] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 263.140998] ? kasan_check_write+0x14/0x20 [ 263.145237] ? do_raw_spin_lock+0xc1/0x200 [ 263.149482] alloc_file+0x24/0x3e0 [ 263.153013] ? clear_nlink.part.9+0x65/0x80 [ 263.157344] __shmem_file_setup+0x313/0x700 [ 263.161675] ? check_same_owner+0x340/0x340 [ 263.165996] ? shmem_fill_super+0xa50/0xa50 [ 263.170314] ? get_unused_fd_flags+0x122/0x1a0 [ 263.174884] ? __alloc_fd+0x710/0x710 [ 263.178686] shmem_file_setup+0x2f/0x40 [ 263.182656] __x64_sys_memfd_create+0x2af/0x4f0 [ 263.187331] ? memfd_fcntl+0x1400/0x1400 [ 263.191410] ? do_syscall_64+0x9a/0x820 [ 263.195377] do_syscall_64+0x1b9/0x820 [ 263.199250] ? finish_task_switch+0x1d3/0x870 [ 263.203745] ? syscall_return_slowpath+0x5e0/0x5e0 [ 263.208682] ? syscall_return_slowpath+0x31d/0x5e0 [ 263.213613] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 263.218973] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.223822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.229000] RIP: 0033:0x455e29 [ 263.232178] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.251517] RSP: 002b:00007f83bbce7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 263.259228] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 263.266484] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 263.273740] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 263.281000] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 263.288262] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000003 03:10:00 executing program 6 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 263.318470] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 263.325795] BTRFS error (device loop7): superblock checksum mismatch [ 263.363351] BTRFS error (device loop7): open_ctree failed [ 263.409192] FAULT_INJECTION: forcing a failure. [ 263.409192] name failslab, interval 1, probability 0, space 0, times 0 [ 263.420624] CPU: 0 PID: 12837 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #142 [ 263.428001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.437361] Call Trace: [ 263.439967] dump_stack+0x1c9/0x2b4 [ 263.443629] ? dump_stack_print_info.cold.2+0x52/0x52 [ 263.448845] ? __lock_acquire+0x7fc/0x5020 [ 263.453127] should_fail.cold.4+0xa/0x1a 03:10:00 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) clone(0x0, &(0x7f00000024c0), &(0x7f0000002540), &(0x7f0000002580), &(0x7f00000025c0)) ptrace$setopts(0x4206, r1, 0x1, 0x8) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000000)) epoll_pwait(r2, &(0x7f0000000100)=[{}], 0x27b, 0xffffffff, &(0x7f0000e1d000), 0x8) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000001c0)={0x8080000005}) ptrace(0x4207, r1) waitid(0x0, 0x0, &(0x7f0000000080), 0x41000002, &(0x7f00000000c0)) 03:10:00 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x800) write$P9_RMKDIR(r0, &(0x7f0000000040)={0x1c3, 0x49, 0x1, {0x0, 0x4, 0x3}}, 0x14) [ 263.457228] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.462347] ? find_held_lock+0x36/0x1c0 [ 263.466423] ? graph_lock+0x170/0x170 [ 263.470243] ? find_held_lock+0x36/0x1c0 [ 263.474326] ? check_same_owner+0x340/0x340 [ 263.478645] ? graph_lock+0x170/0x170 [ 263.482460] ? rcu_note_context_switch+0x730/0x730 [ 263.487397] ? kasan_check_read+0x11/0x20 [ 263.491536] __should_failslab+0x124/0x180 [ 263.495761] should_failslab+0x9/0x14 [ 263.499563] kmem_cache_alloc+0x2af/0x760 [ 263.503713] ? find_held_lock+0x36/0x1c0 [ 263.507780] get_empty_filp+0x12d/0x530 [ 263.511743] ? proc_nr_files+0x60/0x60 [ 263.515656] ? kasan_check_read+0x11/0x20 [ 263.519795] ? do_raw_spin_unlock+0xa7/0x2f0 [ 263.524203] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 263.528776] ? kasan_check_write+0x14/0x20 [ 263.533013] ? do_raw_spin_lock+0xc1/0x200 [ 263.537242] alloc_file+0x24/0x3e0 [ 263.540779] ? clear_nlink.part.9+0x65/0x80 [ 263.545101] __shmem_file_setup+0x313/0x700 [ 263.549422] ? check_same_owner+0x340/0x340 [ 263.553735] ? shmem_fill_super+0xa50/0xa50 [ 263.558047] ? get_unused_fd_flags+0x122/0x1a0 [ 263.562613] ? __alloc_fd+0x710/0x710 [ 263.566426] shmem_file_setup+0x2f/0x40 [ 263.570402] __x64_sys_memfd_create+0x2af/0x4f0 [ 263.575060] ? memfd_fcntl+0x1400/0x1400 [ 263.579120] ? do_syscall_64+0x9a/0x820 [ 263.583099] do_syscall_64+0x1b9/0x820 [ 263.586976] ? finish_task_switch+0x1d3/0x870 [ 263.591461] ? syscall_return_slowpath+0x5e0/0x5e0 [ 263.596389] ? syscall_return_slowpath+0x31d/0x5e0 [ 263.601311] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 263.606666] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.611587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.616764] RIP: 0033:0x455e29 [ 263.619934] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.639211] RSP: 002b:00007f01eda57a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 263.646912] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 03:10:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 263.654179] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 263.661433] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 263.668689] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 263.675944] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000003 03:10:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca9018", 0x89, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:00 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539", 0xcd, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x20}, 0xc) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+procem1-userem0md5sum&!!vboxnet0lonodev$eth1[eth1^\x00'}, 0x10) setsockopt$packet_int(r3, 0x107, 0x1f, &(0x7f0000000240)=0x7, 0x4) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000200)=""/16) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f00000000c0)=""/132) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f00000001c0)=0x1) 03:10:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="01000400001e00fb014d564b0000000001258adf00735e0c55dddf5763df3da4d8ec8b68bbbb05549248a7372f13ad66b3ab00666c8ad56e7b62f150cff19579f1de1b0d6e3e54fc8174db56a13c890833f93ebd5be2bfe57c985c2fbe8f4d2445fcaa41e51599f0e777f8"]) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x40000071, 0x91048501]}) 03:10:00 executing program 6 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 263.814102] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 263.821377] BTRFS error (device loop7): superblock checksum mismatch 03:10:00 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0", 0xde, 0x10000}], 0x0, &(0x7f0000000240)) [ 263.858783] BTRFS error (device loop7): open_ctree failed [ 263.878487] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 263.885792] BTRFS error (device loop7): superblock checksum mismatch 03:10:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 263.946159] BTRFS error (device loop7): open_ctree failed 03:10:00 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0", 0xde, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8d", 0x1, 0x10000}], 0x0, &(0x7f0000000240)) [ 264.075664] FAULT_INJECTION: forcing a failure. [ 264.075664] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 264.081437] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 2530879793048935964 transid 756082810144684242 /dev/loop7 [ 264.088078] CPU: 1 PID: 12885 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #142 [ 264.107406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.116772] Call Trace: [ 264.119379] dump_stack+0x1c9/0x2b4 [ 264.123032] ? dump_stack_print_info.cold.2+0x52/0x52 [ 264.128264] ? __radix_tree_lookup+0x3dd/0x6e0 [ 264.132873] should_fail.cold.4+0xa/0x1a [ 264.136955] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.142074] ? graph_lock+0x170/0x170 [ 264.145896] ? find_held_lock+0x36/0x1c0 [ 264.149972] ? find_held_lock+0x36/0x1c0 [ 264.154042] ? __lock_is_held+0xb5/0x140 [ 264.158118] ? check_same_owner+0x340/0x340 [ 264.162444] ? rcu_note_context_switch+0x730/0x730 [ 264.167377] __alloc_pages_nodemask+0x36e/0xdb0 [ 264.172044] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 264.177055] ? trace_hardirqs_on+0x10/0x10 [ 264.181312] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 264.186319] ? percpu_counter_add_batch+0xf2/0x150 [ 264.191236] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 264.196239] ? __vm_enough_memory+0x590/0x980 [ 264.200721] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 264.206260] alloc_pages_vma+0xdd/0x540 [ 264.210224] shmem_alloc_page+0xa8/0x190 [ 264.214271] ? shmem_swapin+0x230/0x230 [ 264.218230] ? print_usage_bug+0xc0/0xc0 [ 264.222291] shmem_alloc_and_acct_page+0x1f1/0x820 [ 264.227208] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 264.231870] shmem_getpage_gfp+0x6ea/0x41e0 [ 264.236186] ? print_usage_bug+0xc0/0xc0 [ 264.240232] ? shmem_writepage+0x1380/0x1380 [ 264.244628] ? print_usage_bug+0xc0/0xc0 [ 264.248676] ? __lock_acquire+0x7fc/0x5020 [ 264.252898] ? print_usage_bug+0xc0/0xc0 [ 264.256945] ? __lock_acquire+0x7fc/0x5020 [ 264.261165] ? print_usage_bug+0xc0/0xc0 [ 264.265212] ? __lock_acquire+0x7fc/0x5020 [ 264.269445] ? __lock_acquire+0x7fc/0x5020 [ 264.273668] ? check_noncircular+0x20/0x20 [ 264.277891] ? __lock_acquire+0x7fc/0x5020 [ 264.282114] ? __lock_acquire+0x7fc/0x5020 [ 264.286347] ? trace_hardirqs_on+0x10/0x10 [ 264.290566] ? print_usage_bug+0xc0/0xc0 [ 264.294613] ? __lock_acquire+0x7fc/0x5020 [ 264.298849] ? print_usage_bug+0xc0/0xc0 [ 264.302895] ? print_usage_bug+0xc0/0xc0 [ 264.306958] ? graph_lock+0x170/0x170 [ 264.310752] ? print_usage_bug+0xc0/0xc0 [ 264.314812] ? __lock_acquire+0x7fc/0x5020 [ 264.319039] ? __lock_acquire+0x7fc/0x5020 [ 264.323266] ? graph_lock+0x170/0x170 [ 264.327063] ? find_held_lock+0x36/0x1c0 [ 264.331114] ? print_usage_bug+0xc0/0xc0 [ 264.335167] ? lock_downgrade+0x8f0/0x8f0 [ 264.339301] ? kasan_check_read+0x11/0x20 [ 264.343436] ? lock_release+0xa30/0xa30 [ 264.347397] ? mark_held_locks+0xc9/0x160 [ 264.351535] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.357062] ? iov_iter_fault_in_readable+0x23d/0x460 [ 264.362235] ? copy_page_from_iter+0x890/0x890 [ 264.366802] ? __sanitizer_cov_trace_const_cmp1+0x1d/0x20 [ 264.372878] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 264.378064] shmem_write_begin+0x110/0x1e0 [ 264.382289] generic_perform_write+0x3ae/0x6c0 [ 264.386862] ? add_page_wait_queue+0x2c0/0x2c0 [ 264.391431] ? file_update_time+0xe4/0x640 [ 264.395652] ? current_time+0x1b0/0x1b0 [ 264.399618] ? down_write+0x8f/0x130 [ 264.403318] __generic_file_write_iter+0x26e/0x630 [ 264.408235] generic_file_write_iter+0x438/0x870 [ 264.412981] ? __generic_file_write_iter+0x630/0x630 [ 264.418076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.423599] ? iov_iter_init+0xc9/0x1f0 [ 264.427565] __vfs_write+0x6c6/0x9f0 [ 264.431265] ? kernel_read+0x120/0x120 [ 264.435143] ? __lock_is_held+0xb5/0x140 [ 264.439200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.444722] ? __sb_start_write+0x17f/0x300 [ 264.449056] vfs_write+0x1f8/0x560 [ 264.452585] ksys_pwrite64+0x181/0x1b0 [ 264.456468] ? __ia32_sys_pread64+0xf0/0xf0 [ 264.460774] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 264.466295] ? fput+0x130/0x1a0 [ 264.469566] ? do_sys_ftruncate+0x44e/0x560 [ 264.473874] __x64_sys_pwrite64+0x97/0xf0 [ 264.478012] do_syscall_64+0x1b9/0x820 [ 264.481902] ? finish_task_switch+0x1d3/0x870 [ 264.486382] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.491299] ? syscall_return_slowpath+0x31d/0x5e0 [ 264.496219] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 264.501571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.506401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.511575] RIP: 0033:0x4100e7 [ 264.514744] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 264.533976] RSP: 002b:00007f01eda57a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 264.541676] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004100e7 [ 264.548930] RDX: 0000000000000113 RSI: 0000000020000500 RDI: 0000000000000014 [ 264.556180] RBP: 0000000000000000 R08: 0000000020000218 R09: 00000000fbad8001 [ 264.563434] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 264.570687] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000004 [ 264.631449] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 264.638741] BTRFS error (device loop7): superblock checksum mismatch [ 264.659897] BTRFS error (device loop7): open_ctree failed [ 264.670969] BTRFS error (device loop7): unsupported checksum algorithm 3786 03:10:01 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:01 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) syz_emit_ethernet(0x22, &(0x7f0000000040)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1=0xe0000001, @remote={0xac, 0x14, 0x14, 0xbb}}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x2, 0x70, 0x2, 0x6, 0x0, 0xffffffffffffffc6, 0x0, 0x8, 0x200, 0xb, 0x8000000000000, 0xeb56, 0xe1, 0x0, 0xff, 0x3, 0x8, 0x0, 0xbf7, 0x6, 0xaa, 0xfff, 0x70b9, 0xdb, 0x0, 0x969f00000000000, 0x2, 0x800, 0x530, 0x0, 0x7, 0x0, 0x7, 0x2, 0xfffffffffffff001, 0x6, 0x9, 0x9, 0x0, 0x1, 0x6, @perf_config_ext={0x1, 0x8001}, 0x401, 0x9, 0x6, 0x851eee3ac74aee64, 0x7fff, 0x0, 0x7ff}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xf02a, 0x4000) getpeername$packet(r2, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000002900)=0x14) bind$bt_hci(r2, &(0x7f0000002940)={0x1f, r3}, 0xc) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f00000000c0)=""/89) 03:10:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x20}, 0xc) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+procem1-userem0md5sum&!!vboxnet0lonodev$eth1[eth1^\x00'}, 0x10) setsockopt$packet_int(r3, 0x107, 0x1f, &(0x7f0000000240)=0x7, 0x4) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000200)=""/16) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f00000000c0)=""/132) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f00000001c0)=0x1) 03:10:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8d", 0x1, 0x10000}], 0x0, &(0x7f0000000240)) [ 264.678351] BTRFS error (device loop7): superblock checksum mismatch [ 264.720770] BTRFS error (device loop7): open_ctree failed [ 264.741756] FAULT_INJECTION: forcing a failure. [ 264.741756] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 264.753733] CPU: 0 PID: 12915 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #142 [ 264.761128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.770488] Call Trace: [ 264.773103] dump_stack+0x1c9/0x2b4 [ 264.776749] ? dump_stack_print_info.cold.2+0x52/0x52 [ 264.781957] ? zap_class+0x740/0x740 [ 264.785720] should_fail.cold.4+0xa/0x1a [ 264.789799] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.794917] ? graph_lock+0x170/0x170 [ 264.798738] ? find_held_lock+0x36/0x1c0 [ 264.802815] ? find_held_lock+0x36/0x1c0 [ 264.806891] ? __lock_is_held+0xb5/0x140 [ 264.810975] ? check_same_owner+0x340/0x340 [ 264.815327] ? rcu_note_context_switch+0x730/0x730 03:10:01 executing program 4: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) nanosleep(&(0x7f0000000400)={0x77359400}, &(0x7f0000006540)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f0000000040)) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x100) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000500)=""/144) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000004, 0x8031, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x4000000008, &(0x7f000092b000/0x9000)=nil) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f00000000c0)) 03:10:01 executing program 6 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49}], 0x0, &(0x7f0000000240)) [ 264.820281] __alloc_pages_nodemask+0x36e/0xdb0 [ 264.824969] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 264.829998] ? trace_hardirqs_on+0x10/0x10 [ 264.834280] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 264.839309] ? percpu_counter_add_batch+0xf2/0x150 [ 264.844250] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 264.849278] ? __vm_enough_memory+0x590/0x980 [ 264.853794] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 264.859350] alloc_pages_vma+0xdd/0x540 [ 264.863343] shmem_alloc_page+0xa8/0x190 [ 264.867124] FAULT_INJECTION: forcing a failure. [ 264.867124] name failslab, interval 1, probability 0, space 0, times 0 [ 264.867408] ? shmem_swapin+0x230/0x230 [ 264.867457] shmem_alloc_and_acct_page+0x1f1/0x820 [ 264.867479] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 264.892615] shmem_getpage_gfp+0x6ea/0x41e0 [ 264.896953] ? print_usage_bug+0xc0/0xc0 [ 264.901012] ? shmem_writepage+0x1380/0x1380 [ 264.905426] ? print_usage_bug+0xc0/0xc0 [ 264.909483] ? __lock_acquire+0x7fc/0x5020 [ 264.913720] ? print_usage_bug+0xc0/0xc0 [ 264.917776] ? __lock_acquire+0x7fc/0x5020 [ 264.922009] ? print_usage_bug+0xc0/0xc0 [ 264.926062] ? __lock_acquire+0x7fc/0x5020 [ 264.930301] ? __lock_acquire+0x7fc/0x5020 [ 264.934559] ? check_noncircular+0x20/0x20 [ 264.938791] ? __lock_acquire+0x7fc/0x5020 [ 264.943023] ? __lock_acquire+0x7fc/0x5020 [ 264.947265] ? zap_class+0x740/0x740 [ 264.950985] ? trace_hardirqs_on+0x10/0x10 [ 264.955212] ? print_usage_bug+0xc0/0xc0 [ 264.959266] ? zap_class+0x740/0x740 [ 264.962974] ? print_usage_bug+0xc0/0xc0 [ 264.967028] ? zap_class+0x740/0x740 [ 264.970733] ? print_usage_bug+0xc0/0xc0 [ 264.974787] ? perf_trace_lock+0xde/0x920 [ 264.978932] ? zap_class+0x740/0x740 [ 264.982656] ? zap_class+0x740/0x740 [ 264.986371] ? graph_lock+0x170/0x170 [ 264.990171] ? find_held_lock+0x36/0x1c0 [ 264.994230] ? print_usage_bug+0xc0/0xc0 [ 264.998295] ? lock_downgrade+0x8f0/0x8f0 [ 265.002437] ? kasan_check_read+0x11/0x20 [ 265.006600] ? lock_release+0xa30/0xa30 [ 265.010574] ? mark_held_locks+0xc9/0x160 [ 265.014720] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.020253] ? iov_iter_fault_in_readable+0x23d/0x460 [ 265.025436] ? copy_page_from_iter+0x890/0x890 [ 265.030022] ? __sanitizer_cov_trace_const_cmp1+0x1d/0x20 [ 265.035565] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 265.040751] shmem_write_begin+0x110/0x1e0 [ 265.045004] generic_perform_write+0x3ae/0x6c0 [ 265.049591] ? add_page_wait_queue+0x2c0/0x2c0 [ 265.054176] ? file_update_time+0xe4/0x640 [ 265.058419] ? current_time+0x1b0/0x1b0 [ 265.062432] ? down_write+0x8f/0x130 [ 265.066146] __generic_file_write_iter+0x26e/0x630 [ 265.071075] generic_file_write_iter+0x438/0x870 [ 265.075832] ? __generic_file_write_iter+0x630/0x630 [ 265.080929] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.086470] ? iov_iter_init+0xc9/0x1f0 [ 265.090457] __vfs_write+0x6c6/0x9f0 [ 265.094168] ? kernel_read+0x120/0x120 [ 265.098065] ? __lock_is_held+0xb5/0x140 [ 265.102133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.107663] ? __sb_start_write+0x17f/0x300 [ 265.112015] vfs_write+0x1f8/0x560 [ 265.115554] ksys_pwrite64+0x181/0x1b0 [ 265.119438] ? __ia32_sys_pread64+0xf0/0xf0 [ 265.123753] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 265.129280] ? fput+0x130/0x1a0 [ 265.132566] ? do_sys_ftruncate+0x44e/0x560 [ 265.136883] __x64_sys_pwrite64+0x97/0xf0 [ 265.141032] do_syscall_64+0x1b9/0x820 [ 265.144911] ? finish_task_switch+0x1d3/0x870 [ 265.149401] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.154325] ? syscall_return_slowpath+0x31d/0x5e0 [ 265.159268] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 265.164630] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.169474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.174660] RIP: 0033:0x4100e7 [ 265.177837] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 265.197181] RSP: 002b:00007f83bbce7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 265.204884] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004100e7 [ 265.212155] RDX: 0000000000000113 RSI: 0000000020000500 RDI: 0000000000000014 [ 265.219431] RBP: 0000000000000000 R08: 0000000020000218 R09: 00000000fbad8001 [ 265.226692] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 265.233961] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000004 [ 265.241247] CPU: 1 PID: 12919 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #142 [ 265.248625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.257994] Call Trace: [ 265.260603] dump_stack+0x1c9/0x2b4 [ 265.264253] ? dump_stack_print_info.cold.2+0x52/0x52 03:10:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8d", 0x1, 0x10000}], 0x0, &(0x7f0000000240)) [ 265.269478] should_fail.cold.4+0xa/0x1a [ 265.273573] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.278706] ? __lock_acquire+0x7fc/0x5020 [ 265.282965] ? print_usage_bug+0xc0/0xc0 [ 265.287066] ? trace_hardirqs_on+0x10/0x10 [ 265.291335] ? print_usage_bug+0xc0/0xc0 [ 265.295420] ? trace_hardirqs_on+0x10/0x10 [ 265.299679] ? lock_downgrade+0x8f0/0x8f0 [ 265.303852] ? __lock_acquire+0x7fc/0x5020 [ 265.308112] ? print_usage_bug+0xc0/0xc0 [ 265.312179] ? perf_trace_lock+0xde/0x920 [ 265.316377] __should_failslab+0x124/0x180 03:10:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x20}, 0xc) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+procem1-userem0md5sum&!!vboxnet0lonodev$eth1[eth1^\x00'}, 0x10) setsockopt$packet_int(r3, 0x107, 0x1f, &(0x7f0000000240)=0x7, 0x4) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000200)=""/16) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f00000000c0)=""/132) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f00000001c0)=0x1) [ 265.320626] should_failslab+0x9/0x14 [ 265.324437] kmem_cache_alloc+0x47/0x760 [ 265.328506] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 265.334401] ? zap_class+0x740/0x740 [ 265.338137] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 265.343872] __radix_tree_create+0x4d6/0x840 [ 265.348307] ? radix_tree_maybe_preload_order+0x110/0x110 [ 265.353861] ? print_usage_bug+0xc0/0xc0 [ 265.357930] ? lock_downgrade+0x8f0/0x8f0 [ 265.362093] ? perf_trace_lock+0xde/0x920 [ 265.366243] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 265.370755] ? start_stop_khugepaged.cold.47+0x46/0x46 [ 265.376046] ? zap_class+0x740/0x740 [ 265.379775] __radix_tree_insert+0x107/0x8f0 [ 265.384193] ? graph_lock+0x170/0x170 [ 265.388011] ? __radix_tree_create+0x840/0x840 [ 265.392607] ? lock_acquire+0x1e4/0x540 [ 265.396592] ? shmem_add_to_page_cache+0x49c/0xe00 [ 265.401536] ? lock_release+0xa30/0xa30 [ 265.405533] ? kasan_check_write+0x14/0x20 [ 265.409775] ? do_raw_spin_lock+0xc1/0x200 [ 265.414031] shmem_add_to_page_cache+0x988/0xe00 [ 265.418790] ? rcu_report_qs_rnp+0x7a0/0x7a0 03:10:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x20}, 0xc) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+procem1-userem0md5sum&!!vboxnet0lonodev$eth1[eth1^\x00'}, 0x10) setsockopt$packet_int(r3, 0x107, 0x1f, &(0x7f0000000240)=0x7, 0x4) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000200)=""/16) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f00000000c0)=""/132) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f00000001c0)=0x1) [ 265.423216] ? shmem_put_link+0x280/0x280 [ 265.427371] ? percpu_ref_put_many+0x131/0x240 [ 265.431958] ? percpu_ref_tryget+0x2d0/0x2d0 [ 265.436390] ? mem_cgroup_try_charge+0x548/0xa70 [ 265.441161] ? mem_cgroup_protected+0xa60/0xa60 [ 265.445850] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.451402] ? shmem_alloc_and_acct_page+0x31a/0x820 [ 265.456519] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 265.461198] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 265.466218] ? __radix_tree_preload+0x173/0x1d0 [ 265.470904] shmem_getpage_gfp+0x81b/0x41e0 [ 265.475250] ? shmem_writepage+0x1380/0x1380 [ 265.479666] ? print_usage_bug+0xc0/0xc0 [ 265.483739] ? __lock_acquire+0x7fc/0x5020 [ 265.487985] ? print_usage_bug+0xc0/0xc0 [ 265.492055] ? __lock_acquire+0x7fc/0x5020 [ 265.496302] ? print_usage_bug+0xc0/0xc0 [ 265.500376] ? __lock_acquire+0x7fc/0x5020 [ 265.504647] ? __lock_acquire+0x7fc/0x5020 [ 265.508898] ? check_noncircular+0x20/0x20 [ 265.513143] ? __lock_acquire+0x7fc/0x5020 [ 265.517399] ? __lock_acquire+0x7fc/0x5020 [ 265.521640] ? zap_class+0x740/0x740 [ 265.525376] ? trace_hardirqs_on+0x10/0x10 [ 265.529617] ? print_usage_bug+0xc0/0xc0 [ 265.533714] ? zap_class+0x740/0x740 [ 265.537469] ? print_usage_bug+0xc0/0xc0 [ 265.541561] ? zap_class+0x740/0x740 [ 265.545288] ? print_usage_bug+0xc0/0xc0 [ 265.549366] ? perf_trace_lock+0xde/0x920 [ 265.553526] ? zap_class+0x740/0x740 [ 265.557251] ? zap_class+0x740/0x740 [ 265.560985] ? graph_lock+0x170/0x170 [ 265.564825] ? find_held_lock+0x36/0x1c0 [ 265.568904] ? print_usage_bug+0xc0/0xc0 [ 265.573024] ? lock_downgrade+0x8f0/0x8f0 [ 265.577183] ? kasan_check_read+0x11/0x20 [ 265.581344] ? lock_release+0xa30/0xa30 [ 265.585356] ? mark_held_locks+0xc9/0x160 [ 265.589520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.595068] ? iov_iter_fault_in_readable+0x23d/0x460 [ 265.600274] ? copy_page_from_iter+0x890/0x890 [ 265.604865] ? __sanitizer_cov_trace_const_cmp1+0x1d/0x20 [ 265.610413] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 265.615624] shmem_write_begin+0x110/0x1e0 [ 265.619882] generic_perform_write+0x3ae/0x6c0 [ 265.624495] ? add_page_wait_queue+0x2c0/0x2c0 [ 265.629095] ? file_update_time+0xe4/0x640 [ 265.633351] ? current_time+0x1b0/0x1b0 [ 265.637345] ? down_write+0x8f/0x130 [ 265.641074] __generic_file_write_iter+0x26e/0x630 [ 265.646021] generic_file_write_iter+0x438/0x870 [ 265.650797] ? __generic_file_write_iter+0x630/0x630 [ 265.655915] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.661463] ? iov_iter_init+0xc9/0x1f0 [ 265.665451] __vfs_write+0x6c6/0x9f0 [ 265.669171] ? kernel_read+0x120/0x120 [ 265.673070] ? __lock_is_held+0xb5/0x140 [ 265.677157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.682701] ? __sb_start_write+0x17f/0x300 [ 265.687028] vfs_write+0x1f8/0x560 [ 265.690579] ksys_pwrite64+0x181/0x1b0 [ 265.694476] ? __ia32_sys_pread64+0xf0/0xf0 [ 265.698809] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 265.704373] ? fput+0x130/0x1a0 [ 265.707666] ? do_sys_ftruncate+0x44e/0x560 [ 265.712000] __x64_sys_pwrite64+0x97/0xf0 [ 265.716162] do_syscall_64+0x1b9/0x820 [ 265.720057] ? finish_task_switch+0x1d3/0x870 [ 265.724564] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.729505] ? syscall_return_slowpath+0x31d/0x5e0 [ 265.734454] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 265.739829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.744689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.749879] RIP: 0033:0x4100e7 [ 265.753063] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 03:10:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x20}, 0xc) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+procem1-userem0md5sum&!!vboxnet0lonodev$eth1[eth1^\x00'}, 0x10) setsockopt$packet_int(r3, 0x107, 0x1f, &(0x7f0000000240)=0x7, 0x4) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000200)=""/16) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f00000000c0)=""/132) 03:10:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x20}, 0xc) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+procem1-userem0md5sum&!!vboxnet0lonodev$eth1[eth1^\x00'}, 0x10) setsockopt$packet_int(r3, 0x107, 0x1f, &(0x7f0000000240)=0x7, 0x4) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000200)=""/16) 03:10:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x20}, 0xc) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+procem1-userem0md5sum&!!vboxnet0lonodev$eth1[eth1^\x00'}, 0x10) setsockopt$packet_int(r3, 0x107, 0x1f, &(0x7f0000000240)=0x7, 0x4) 03:10:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x20}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+procem1-userem0md5sum&!!vboxnet0lonodev$eth1[eth1^\x00'}, 0x10) [ 265.772496] RSP: 002b:00007f01eda57a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 265.780223] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004100e7 [ 265.787509] RDX: 0000000000000113 RSI: 0000000020000500 RDI: 0000000000000014 [ 265.794797] RBP: 0000000000000000 R08: 0000000020000218 R09: 00000000fbad8001 [ 265.802102] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 265.809412] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000005 03:10:02 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0", 0xde, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:02 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4000, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000000c0)=""/222) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)) 03:10:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x20}, 0xc) 03:10:02 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 266.003717] print_req_error: I/O error, dev loop0, sector 128 [ 266.019251] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 266.026558] BTRFS error (device loop7): superblock checksum mismatch 03:10:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f0000000240)) [ 266.155502] BTRFS error (device loop7): open_ctree failed 03:10:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x380, [0x20000280, 0x0, 0x0, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000000), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x40, 0x10, 'veth1_to_bond\x00', 'team0\x00', 'veth0_to_bond\x00', 'team_slave_1\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xb}, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x120, 0x120, 0x158, [@connbytes={'connbytes\x00', 0x18, {{0x8000, 0x80}}}, @rateest={'rateest\x00', 0x48, {{'bridge_slave_0\x00', 'lo\x00', 0x1, 0x3, 0x0, 0x6, 0x2, 0x3, 0x7, 0x4211}}}]}}, @snat={'snat\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x10, 0x11, 'ipddp0\x00', 'lo\x00', 'veth0_to_bond\x00', 'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0xff, 0x0, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1e}, [0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x160, 0x198, [@connbytes={'connbytes\x00', 0x18, {{0x1, 0x3, 0x1, 0x3}}}, @vlan={'vlan\x00', 0x8, {{0x1, 0x3, 0x88be, 0x1, 0x4}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0xf183, 0x7fffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0xfffffffffffffffd}}}}]}]}, 0x3f8) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x80000200007fe, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) 03:10:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49}], 0x0, &(0x7f0000000240)) 03:10:03 executing program 1: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = socket(0xf, 0x1, 0x6) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000180)={r3, 0x3f, 0x1, [0xd6]}, &(0x7f00000001c0)=0xa) getpeername$inet(r0, &(0x7f0000000080)={0x0, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0xc) 03:10:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:03 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:03 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa3806", 0xe6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:03 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 267.083160] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 267.110676] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 267.117929] BTRFS error (device loop7): superblock checksum mismatch 03:10:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49}], 0x0, &(0x7f0000000240)) 03:10:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYRES64=0x0, @ANYRESOCT=r0], 0x2}, 0x1}, 0x2) sendfile(r0, r0, &(0x7f0000000080), 0x4) 03:10:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:03 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 267.190820] BTRFS error (device loop7): open_ctree failed [ 267.206223] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 03:10:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="c5825ed272726965722c05000000000000000000003f2c00e7e4074e3d6e76e5e6da2063971eabd19dfefe47b84e196d7fc7953918b4cefae908ef77ebfe19c66c022b8a56d3b7d3bff038d01912eab1484c3140832612cf8e75abf340c11e4f18ec995c5f4619024c4f0000000000"]) 03:10:04 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa3806", 0xe6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents(r0, &(0x7f0000000000)=""/8, 0x8) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x9) flistxattr(r1, &(0x7f0000000140)=""/41, 0x29) getdents(r0, &(0x7f0000000200)=""/127, 0x352) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) fcntl$setown(r1, 0x8, r2) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x8000, 0x0) 03:10:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628a", 0x67, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:04 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 267.405929] hfsplus: unable to parse mount options [ 267.444272] hfsplus: unable to parse mount options 03:10:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 267.534245] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 267.541769] BTRFS error (device loop7): superblock checksum mismatch 03:10:04 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400, 0x100) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000140)={0x7, 0x2, 'client1\x00', 0x1, "35650877cb946c24", "b6817b13b1d1f69b0835427e6ffb50e1a21d0484d273efb9554882beb53180fa", 0x2, 0x5}) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0xfffffffffffffff8, 0x40, 0x1, 0x9, 0x882b, 0xe, 0x8, {0x0, @in={{0x2, 0x4e23, @loopback=0x7f000001}}, 0x4, 0x3, 0x800, 0x0, 0x3f}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="ea000000dc17d33087ae0f0068c1eb02417da0f16544de2543914b5d93d67b2c59c26570d23c72bb0ae84f71fbd2d8004840c5210b8c4d075203c18939081c971cad0d7329aa6b93d54117f025e9ef3e1a1de0229d5a1ee0e9dd23574f3f21e035c0e830a42b12a3b88bcba08b6f297c45c26dfbe50aa36cfbe2abc3c25267a779f2b326e3545df8bba64851d5e749465e4749a7693dfd500d77934a2393cc1e675b3b9a42428e31c1c0e02bc0baed8dd86e42009a612d2ae96144c8220ef4d9fb307107d50556dfa8a8782c0ffba58188f6c322fd351786446beb1c1838a415fe37ba9d6671d97cdfe7680fabfc"], &(0x7f00000000c0)=0xf2) syz_emit_ethernet(0x140, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@timestamp={0x7, 0x10, 0x7, 0x0, 0x0, [{}, {}, {}]}]}}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000001}}}}}, &(0x7f0000000000)) 03:10:04 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockname$netlink(r0, &(0x7f0000000000), &(0x7f0000000080)=0xc) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3ff, 0x10000) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xc72000)=nil, 0xc72000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r2, 0x65, 0x3, &(0x7f0000000040)="f0000003", 0x4) [ 267.641016] BTRFS error (device loop7): open_ctree failed 03:10:04 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 267.683431] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 267.690702] BTRFS error (device loop7): superblock checksum mismatch [ 267.708776] BTRFS error (device loop7): open_ctree failed [ 267.714022] FAULT_INJECTION: forcing a failure. [ 267.714022] name failslab, interval 1, probability 0, space 0, times 0 [ 267.725799] CPU: 0 PID: 13095 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #142 [ 267.733174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.742536] Call Trace: [ 267.745148] dump_stack+0x1c9/0x2b4 [ 267.748798] ? dump_stack_print_info.cold.2+0x52/0x52 [ 267.754018] should_fail.cold.4+0xa/0x1a [ 267.758100] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.763222] ? lock_downgrade+0x8f0/0x8f0 [ 267.767388] ? proc_fail_nth_write+0x9e/0x210 [ 267.771897] ? proc_cwd_link+0x1d0/0x1d0 [ 267.775979] ? find_held_lock+0x36/0x1c0 [ 267.780072] ? check_same_owner+0x340/0x340 [ 267.784411] ? rcu_note_context_switch+0x730/0x730 [ 267.789359] __should_failslab+0x124/0x180 [ 267.793614] should_failslab+0x9/0x14 [ 267.797428] __kmalloc+0x2c8/0x760 [ 267.800978] ? strncpy_from_user+0x510/0x510 [ 267.805402] ? fput+0x130/0x1a0 [ 267.808687] ? __x64_sys_memfd_create+0x142/0x4f0 [ 267.813520] __x64_sys_memfd_create+0x142/0x4f0 [ 267.818182] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 267.823719] ? memfd_fcntl+0x1400/0x1400 [ 267.827771] ? do_syscall_64+0x9a/0x820 [ 267.831737] do_syscall_64+0x1b9/0x820 [ 267.835613] ? finish_task_switch+0x1d3/0x870 [ 267.840099] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.845034] ? syscall_return_slowpath+0x31d/0x5e0 [ 267.849973] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 267.855332] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.860168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.865361] RIP: 0033:0x455e29 03:10:04 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) rt_sigtimedwait(&(0x7f0000000000)={0xfffffffffffff6b1}, &(0x7f0000000040), &(0x7f0000000080)={0x77359400}, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000440), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180)="01", &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) fcntl$setflags(r0, 0x2, 0x1) 03:10:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="627472667304", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:04 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0", 0xde, 0x10000}], 0x0, &(0x7f0000000240)) [ 267.868547] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.887827] RSP: 002b:00007ff193aada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 267.895626] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 267.902883] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 267.910140] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 267.917395] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 267.924662] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000000 03:10:04 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:04 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000140), 0x0, &(0x7f0000efe000)={0x2000}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x10000, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000100)={r3}) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)={[{0x2d, 'io', 0x20}, {0x2d, 'rdma', 0x20}, {0x2b, 'cpu', 0x20}, {0x2b, 'io', 0x20}, {0x743042abd46e6574, 'rdma', 0x20}]}, 0x19) r5 = dup3(r4, r4, 0x80000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) fcntl$notify(r1, 0x402, 0x80000004) 03:10:04 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="627472667306", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:04 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:04 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 268.107945] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 268.115218] BTRFS error (device loop7): superblock checksum mismatch 03:10:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="b9c70b0000b802000000ba000000000f300f21bcc42175d08cf6d66a0000c4624d93443a00b9980100000f3265f2410f0866470fe07d001d0000000043d9fe66baf80cb85cc87b8fef66bafc0ced", 0x4e}], 0x1, 0x0, &(0x7f0000000400)=[@dstype3={0x7, 0xb}, @vmwrite={0x8, 0x0, 0x24000000000000, 0x0, 0x8, 0x0, 0x9}], 0x2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'bond0\x00'}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dsp\x00', 0x8000, 0x0) write$9p(r2, &(0x7f00000004c0)="e344e2a03bae5401cf885225edcaaad68592fe97db6a46d0a803e9cb80eb224422488b08817c42d01118f9da5f5e27dae31ac6678ae033a367a62638a1e36d1210e62d5a7271286fdb4fedeb740486ffa7abe6688a6ba17f53df0f274fe979a20c6d6900b69680f9254cb5d854aa75ee822066508bb7bbe7770fa781991f008201c5af6c10426e5205a7ef0b98a3f1a3c3d9768c7de96209e189e5fd1243b1a9865d8a5902123763754dcc02da9d716705f73f2492b6ae8299eaf81763dcacdef85704dad40922b4d1a2c09b93999f0d67f9aecd06c4489aaeff87", 0xdb) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000003c0)={0x9, 0x10000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f00000000c0), 0x0) r4 = request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)='/dev/kvm\x00', 0xffffffffffffffff) socket$inet6_sctp(0xa, 0x1, 0x84) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, r4, 0xffffffffffffff4b, 0x401, r5) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x200002, 0x0) bind$vsock_stream(r6, &(0x7f00000005c0)={0x28, 0x0, 0x2711, @reserved=0x1}, 0x10) ioctl$BLKALIGNOFF(r6, 0x127a, &(0x7f0000000380)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000440)={0x1f, 0x3, 0x1, 0x610f, 0x4ef}, 0x14) [ 268.181239] BTRFS error (device loop7): open_ctree failed 03:10:04 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 268.267207] FAULT_INJECTION: forcing a failure. [ 268.267207] name failslab, interval 1, probability 0, space 0, times 0 [ 268.278621] CPU: 1 PID: 13148 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #142 [ 268.286012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.295394] Call Trace: [ 268.298018] dump_stack+0x1c9/0x2b4 [ 268.301669] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.306864] ? zap_class+0x740/0x740 [ 268.310590] should_fail.cold.4+0xa/0x1a [ 268.314660] ? trace_hardirqs_on+0x10/0x10 [ 268.318893] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.324002] ? find_held_lock+0x36/0x1c0 [ 268.328076] ? find_held_lock+0x36/0x1c0 [ 268.332139] ? check_same_owner+0x340/0x340 [ 268.336474] ? rcu_note_context_switch+0x730/0x730 [ 268.341395] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 268.346405] __should_failslab+0x124/0x180 [ 268.350645] should_failslab+0x9/0x14 [ 268.354441] kmem_cache_alloc+0x2af/0x760 [ 268.358593] __d_alloc+0xc8/0xd50 [ 268.362048] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 268.367067] ? do_raw_spin_unlock+0xa7/0x2f0 [ 268.371484] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 268.376826] ? __lock_is_held+0xb5/0x140 [ 268.380903] ? _raw_spin_unlock+0x22/0x30 [ 268.385043] ? __alloc_fd+0x34e/0x710 [ 268.388838] ? exit_files+0xb0/0xb0 [ 268.392469] d_alloc_pseudo+0x1d/0x30 [ 268.396275] __shmem_file_setup+0x1f3/0x700 [ 268.400600] ? check_same_owner+0x340/0x340 [ 268.404924] ? shmem_fill_super+0xa50/0xa50 [ 268.409239] ? get_unused_fd_flags+0x122/0x1a0 [ 268.413809] ? __alloc_fd+0x710/0x710 [ 268.417606] shmem_file_setup+0x2f/0x40 [ 268.421606] __x64_sys_memfd_create+0x2af/0x4f0 [ 268.426270] ? memfd_fcntl+0x1400/0x1400 [ 268.430325] ? do_syscall_64+0x9a/0x820 [ 268.434304] do_syscall_64+0x1b9/0x820 [ 268.438189] ? finish_task_switch+0x1d3/0x870 [ 268.442686] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.447626] ? syscall_return_slowpath+0x31d/0x5e0 [ 268.452562] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 268.457930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.462776] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.467961] RIP: 0033:0x455e29 [ 268.471145] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.490415] RSP: 002b:00007ff193aada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 268.498126] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 268.505384] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 268.512639] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 268.519895] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 268.527152] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000001 03:10:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:05 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 268.666890] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 268.674132] BTRFS error (device loop7): superblock checksum mismatch [ 268.706647] kvm: pic: single mode not supported 03:10:05 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 268.706868] kvm: pic: level sensitive irq not supported [ 268.788339] BTRFS error (device loop7): open_ctree failed [ 268.856626] FAULT_INJECTION: forcing a failure. [ 268.856626] name failslab, interval 1, probability 0, space 0, times 0 [ 268.868072] CPU: 0 PID: 13180 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #142 [ 268.875451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.884842] Call Trace: [ 268.887450] dump_stack+0x1c9/0x2b4 [ 268.891094] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.896301] ? __kernel_text_address+0xd/0x40 [ 268.900824] should_fail.cold.4+0xa/0x1a [ 268.904902] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.910023] ? save_stack+0xa9/0xd0 [ 268.913660] ? save_stack+0x43/0xd0 [ 268.917293] ? kasan_kmalloc+0xc4/0xe0 [ 268.921187] ? kmem_cache_alloc+0x12e/0x760 [ 268.925501] ? __d_alloc+0xc8/0xd50 [ 268.929125] ? d_alloc_pseudo+0x1d/0x30 [ 268.933091] ? __shmem_file_setup+0x1f3/0x700 [ 268.937575] ? shmem_file_setup+0x2f/0x40 [ 268.941717] ? find_held_lock+0x36/0x1c0 [ 268.945785] ? check_same_owner+0x340/0x340 [ 268.950122] ? rcu_note_context_switch+0x730/0x730 [ 268.955049] ? kasan_check_read+0x11/0x20 [ 268.959192] __should_failslab+0x124/0x180 [ 268.963633] should_failslab+0x9/0x14 [ 268.967438] kmem_cache_alloc+0x2af/0x760 [ 268.971579] ? rcu_read_lock_sched_held+0x108/0x120 [ 268.976583] ? kmem_cache_alloc+0x5fa/0x760 [ 268.980907] ? shmem_destroy_callback+0xc0/0xc0 [ 268.985566] shmem_alloc_inode+0x1b/0x40 [ 268.989616] alloc_inode+0x63/0x190 [ 268.993235] new_inode_pseudo+0x71/0x1a0 [ 268.997290] ? prune_icache_sb+0x1b0/0x1b0 [ 269.001517] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 269.006528] new_inode+0x1c/0x40 [ 269.009897] shmem_get_inode+0xf1/0x910 [ 269.013863] ? shmem_encode_fh+0x340/0x340 [ 269.018088] ? _raw_spin_unlock+0x22/0x30 [ 269.022226] ? __alloc_fd+0x34e/0x710 [ 269.026040] ? exit_files+0xb0/0xb0 [ 269.029685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.035220] __shmem_file_setup+0x259/0x700 [ 269.039532] ? check_same_owner+0x340/0x340 [ 269.043846] ? shmem_fill_super+0xa50/0xa50 [ 269.048193] ? get_unused_fd_flags+0x122/0x1a0 [ 269.052764] ? __alloc_fd+0x710/0x710 [ 269.056560] shmem_file_setup+0x2f/0x40 [ 269.060526] __x64_sys_memfd_create+0x2af/0x4f0 [ 269.065188] ? memfd_fcntl+0x1400/0x1400 [ 269.069245] ? do_syscall_64+0x9a/0x820 [ 269.073217] do_syscall_64+0x1b9/0x820 [ 269.077092] ? finish_task_switch+0x1d3/0x870 [ 269.081578] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.086496] ? syscall_return_slowpath+0x31d/0x5e0 [ 269.091432] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 269.096801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.101652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.106831] RIP: 0033:0x455e29 [ 269.110019] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.129369] RSP: 002b:00007ff193aada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 269.137082] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 269.144355] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 269.151623] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 269.158891] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 269.166153] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000002 03:10:05 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x44031, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f0000000000)=""/4, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f75702e6370e6c10c6724cb7a", 0x200002, 0x0) 03:10:05 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:05 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 269.275493] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 2530879793048935964 transid 756082810144684242 /dev/loop3 [ 269.297861] print_req_error: I/O error, dev loop0, sector 128 03:10:06 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e", 0x56, 0x10000}], 0x0, &(0x7f0000000240)) [ 269.329294] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 269.336544] BTRFS error (device loop3): superblock checksum mismatch 03:10:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 269.409757] BTRFS error (device loop3): open_ctree failed 03:10:06 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c3", 0xce, 0x10000}], 0x0, &(0x7f0000000240)) [ 269.453657] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 269.460886] BTRFS error (device loop3): superblock checksum mismatch [ 269.526068] BTRFS error (device loop3): open_ctree failed [ 269.545589] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 269.552838] BTRFS error (device loop3): superblock checksum mismatch [ 269.566417] FAULT_INJECTION: forcing a failure. [ 269.566417] name failslab, interval 1, probability 0, space 0, times 0 [ 269.577795] CPU: 0 PID: 13241 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #142 [ 269.585164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.594521] Call Trace: [ 269.597148] dump_stack+0x1c9/0x2b4 [ 269.600780] ? dump_stack_print_info.cold.2+0x52/0x52 [ 269.605989] ? __lock_acquire+0x7fc/0x5020 [ 269.610231] should_fail.cold.4+0xa/0x1a [ 269.614305] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.619400] ? find_held_lock+0x36/0x1c0 [ 269.623460] ? graph_lock+0x170/0x170 [ 269.627263] ? find_held_lock+0x36/0x1c0 [ 269.631338] ? check_same_owner+0x340/0x340 [ 269.635648] ? graph_lock+0x170/0x170 [ 269.639436] ? rcu_note_context_switch+0x730/0x730 [ 269.644363] ? kasan_check_read+0x11/0x20 [ 269.648514] __should_failslab+0x124/0x180 [ 269.652750] should_failslab+0x9/0x14 [ 269.656543] kmem_cache_alloc+0x2af/0x760 [ 269.660678] ? find_held_lock+0x36/0x1c0 [ 269.664730] get_empty_filp+0x12d/0x530 [ 269.668692] ? proc_nr_files+0x60/0x60 [ 269.672571] ? kasan_check_read+0x11/0x20 [ 269.676705] ? do_raw_spin_unlock+0xa7/0x2f0 [ 269.681107] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 269.685678] ? kasan_check_write+0x14/0x20 [ 269.689910] ? do_raw_spin_lock+0xc1/0x200 [ 269.694134] alloc_file+0x24/0x3e0 [ 269.697661] ? clear_nlink.part.9+0x65/0x80 [ 269.701981] __shmem_file_setup+0x313/0x700 [ 269.706292] ? check_same_owner+0x340/0x340 [ 269.710616] ? shmem_fill_super+0xa50/0xa50 [ 269.714927] ? get_unused_fd_flags+0x122/0x1a0 [ 269.719507] ? __alloc_fd+0x710/0x710 [ 269.723308] shmem_file_setup+0x2f/0x40 [ 269.727276] __x64_sys_memfd_create+0x2af/0x4f0 [ 269.731945] ? memfd_fcntl+0x1400/0x1400 [ 269.735994] ? do_syscall_64+0x9a/0x820 [ 269.739960] do_syscall_64+0x1b9/0x820 [ 269.743835] ? finish_task_switch+0x1d3/0x870 [ 269.748317] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.753243] ? syscall_return_slowpath+0x31d/0x5e0 [ 269.758167] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 269.763532] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.768378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.773554] RIP: 0033:0x455e29 [ 269.776725] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.795957] RSP: 002b:00007ff193aada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 269.803656] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 269.810923] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 269.818190] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 269.825457] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 269.832712] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000003 03:10:06 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:06 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UFFDIO_COPY(r0, 0x406855c9, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil}) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000000)) 03:10:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x227e) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:06 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c3", 0xce, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="b9c70b0000b802000000ba000000000f300f21bcc42175d08cf6d66a0000c4624d93443a00b9980100000f3265f2410f0866470fe07d001d0000000043d9fe66baf80cb85cc87b8fef66bafc0ced", 0x4e}], 0x1, 0x0, &(0x7f0000000400)=[@dstype3={0x7, 0xb}, @vmwrite={0x8, 0x0, 0x24000000000000, 0x0, 0x8, 0x0, 0x9}], 0x2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'bond0\x00'}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dsp\x00', 0x8000, 0x0) write$9p(r2, &(0x7f00000004c0)="e344e2a03bae5401cf885225edcaaad68592fe97db6a46d0a803e9cb80eb224422488b08817c42d01118f9da5f5e27dae31ac6678ae033a367a62638a1e36d1210e62d5a7271286fdb4fedeb740486ffa7abe6688a6ba17f53df0f274fe979a20c6d6900b69680f9254cb5d854aa75ee822066508bb7bbe7770fa781991f008201c5af6c10426e5205a7ef0b98a3f1a3c3d9768c7de96209e189e5fd1243b1a9865d8a5902123763754dcc02da9d716705f73f2492b6ae8299eaf81763dcacdef85704dad40922b4d1a2c09b93999f0d67f9aecd06c4489aaeff87", 0xdb) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000003c0)={0x9, 0x10000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f00000000c0), 0x0) r4 = request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)='/dev/kvm\x00', 0xffffffffffffffff) socket$inet6_sctp(0xa, 0x1, 0x84) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, r4, 0xffffffffffffff4b, 0x401, r5) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x200002, 0x0) bind$vsock_stream(r6, &(0x7f00000005c0)={0x28, 0x0, 0x2711, @reserved=0x1}, 0x10) ioctl$BLKALIGNOFF(r6, 0x127a, &(0x7f0000000380)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000440)={0x1f, 0x3, 0x1, 0x610f, 0x4ef}, 0x14) 03:10:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x1, 0xa, 0x40, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0x100000001) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x14, 0x22, 0x1, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 03:10:06 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 269.945591] BTRFS error (device loop3): open_ctree failed 03:10:06 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x227e) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 270.019386] BTRFS error (device loop0): superblock checksum mismatch [ 270.039329] FAULT_INJECTION: forcing a failure. [ 270.039329] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.051341] CPU: 1 PID: 13274 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #142 [ 270.058717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.068078] Call Trace: [ 270.070687] dump_stack+0x1c9/0x2b4 [ 270.074326] ? dump_stack_print_info.cold.2+0x52/0x52 [ 270.079519] ? zap_class+0x740/0x740 [ 270.083237] should_fail.cold.4+0xa/0x1a [ 270.087295] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.092404] ? __isolate_free_page+0x690/0x690 [ 270.096998] ? graph_lock+0x170/0x170 [ 270.100792] ? find_held_lock+0x36/0x1c0 [ 270.104840] ? find_held_lock+0x36/0x1c0 [ 270.108891] ? __lock_is_held+0xb5/0x140 [ 270.112961] ? check_same_owner+0x340/0x340 [ 270.117275] ? rcu_note_context_switch+0x730/0x730 [ 270.122198] __alloc_pages_nodemask+0x36e/0xdb0 [ 270.126873] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 270.131884] ? trace_hardirqs_on+0x10/0x10 [ 270.136127] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 270.141148] ? percpu_counter_add_batch+0xf2/0x150 [ 270.146070] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 270.151088] ? __vm_enough_memory+0x590/0x980 [ 270.155574] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 270.161104] alloc_pages_vma+0xdd/0x540 [ 270.165088] shmem_alloc_page+0xa8/0x190 [ 270.169151] ? shmem_swapin+0x230/0x230 [ 270.173137] shmem_alloc_and_acct_page+0x1f1/0x820 [ 270.178061] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 270.182743] shmem_getpage_gfp+0x6ea/0x41e0 [ 270.187075] ? print_usage_bug+0xc0/0xc0 [ 270.191124] ? shmem_writepage+0x1380/0x1380 [ 270.195519] ? print_usage_bug+0xc0/0xc0 [ 270.199574] ? __lock_acquire+0x7fc/0x5020 [ 270.203800] ? print_usage_bug+0xc0/0xc0 [ 270.207848] ? __lock_acquire+0x7fc/0x5020 [ 270.212083] ? print_usage_bug+0xc0/0xc0 [ 270.216133] ? __lock_acquire+0x7fc/0x5020 [ 270.220354] ? __lock_acquire+0x7fc/0x5020 [ 270.224581] ? check_noncircular+0x20/0x20 [ 270.228806] ? __lock_acquire+0x7fc/0x5020 [ 270.233044] ? __lock_acquire+0x7fc/0x5020 [ 270.237276] ? zap_class+0x740/0x740 [ 270.240999] ? trace_hardirqs_on+0x10/0x10 [ 270.245238] ? print_usage_bug+0xc0/0xc0 [ 270.249285] ? zap_class+0x740/0x740 [ 270.252999] ? print_usage_bug+0xc0/0xc0 [ 270.257063] ? zap_class+0x740/0x740 [ 270.260762] ? print_usage_bug+0xc0/0xc0 [ 270.264824] ? perf_trace_lock+0xde/0x920 [ 270.268964] ? zap_class+0x740/0x740 [ 270.272678] ? zap_class+0x740/0x740 [ 270.276540] ? graph_lock+0x170/0x170 [ 270.280341] ? find_held_lock+0x36/0x1c0 [ 270.284410] ? print_usage_bug+0xc0/0xc0 [ 270.288466] ? lock_downgrade+0x8f0/0x8f0 [ 270.292603] ? kasan_check_read+0x11/0x20 [ 270.296745] ? lock_release+0xa30/0xa30 [ 270.300708] ? mark_held_locks+0xc9/0x160 [ 270.304867] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.310506] ? iov_iter_fault_in_readable+0x23d/0x460 [ 270.315696] ? copy_page_from_iter+0x890/0x890 [ 270.320267] ? __sanitizer_cov_trace_const_cmp1+0x1d/0x20 [ 270.325804] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 270.330999] shmem_write_begin+0x110/0x1e0 [ 270.335233] generic_perform_write+0x3ae/0x6c0 [ 270.339815] ? add_page_wait_queue+0x2c0/0x2c0 [ 270.344383] ? file_update_time+0xe4/0x640 [ 270.348619] ? current_time+0x1b0/0x1b0 [ 270.352590] ? down_write+0x8f/0x130 [ 270.356294] __generic_file_write_iter+0x26e/0x630 [ 270.361217] generic_file_write_iter+0x438/0x870 [ 270.365976] ? __generic_file_write_iter+0x630/0x630 [ 270.371079] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.377333] ? iov_iter_init+0xc9/0x1f0 [ 270.381319] __vfs_write+0x6c6/0x9f0 [ 270.385039] ? kernel_read+0x120/0x120 [ 270.388930] ? __lock_is_held+0xb5/0x140 [ 270.392988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.398522] ? __sb_start_write+0x17f/0x300 [ 270.402843] vfs_write+0x1f8/0x560 [ 270.406373] ksys_pwrite64+0x181/0x1b0 [ 270.410260] ? __ia32_sys_pread64+0xf0/0xf0 [ 270.414570] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 270.420091] ? fput+0x130/0x1a0 [ 270.423360] ? do_sys_ftruncate+0x44e/0x560 [ 270.427681] __x64_sys_pwrite64+0x97/0xf0 [ 270.431816] do_syscall_64+0x1b9/0x820 [ 270.435688] ? finish_task_switch+0x1d3/0x870 [ 270.440180] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.445099] ? syscall_return_slowpath+0x31d/0x5e0 [ 270.450027] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 270.455379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.460215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.465387] RIP: 0033:0x4100e7 [ 270.468557] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 270.487818] RSP: 002b:00007ff193aada80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 270.495516] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004100e7 [ 270.502769] RDX: 0000000000000049 RSI: 0000000020000500 RDI: 0000000000000014 [ 270.510027] RBP: 0000000000000000 R08: 0000000020000218 R09: 00000000fbad8001 03:10:07 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c3", 0xce, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f0000000240)) [ 270.517279] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 270.524536] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000004 03:10:07 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:07 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x40016b}, 0xffffffffffffff9e) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000780)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0x0, 0x100, 0x200, 0x0, 0x100, 0x300, 0x300, 0x300, 0x300, 0x300, 0x4, &(0x7f0000000440), {[{{@uncond, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x6, 0x3c98}, {0xffffffff, 0xffffffff80000001, 0x3ff}, {0x3ff, 0x7, 0x8}, 0x2800000, 0x1}}}, {{@uncond, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x1e, 0xfffffffffffffde4, 0x3}, {0x5, 0x100000000, 0x3}, {0x9, 0x4, 0x3}, 0x0, 0x1}}}, {{@uncond, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x7, 0x1, 0xf381}, {0x3, 0xc7bd, 0x6}, {0x9, 0xffff, 0x7fff}, 0x9, 0x101}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x430) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x0, &(0x7f0000000340)=ANY=[@ANYRES16=r0], &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000000)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r2, 0x50, &(0x7f0000000100)}, 0x10) r3 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x4, 0x800) syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0x10000, 0x400001) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000600)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000640)={0xe3, r4, 0x302, 0x70bd2a, 0x25dfdbfb, {0xc}, [@IPVS_CMD_ATTR_DEST={0x78, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xe3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x1f}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local={0xfe, 0x80, [], 0xaa}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2b, 0x1}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x54}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x20}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4}, 0x40000) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x10000, 0x2, 0x0, 0x3, 0x11, 0x8, "408b0935e8c9e5c707f39d6c7433c8571213f14cea1083dc6c84c5e82f0cb42c30967a7f538b2f46dc4a643cc5e7ffceea2f3f1d347a390c62c2ba1efdebece1", "48fab492d859dad1e092d8ba378438ae72439a882a6453a062d36ba0e6174af9cde080d1aaad55a1de36da3b7ffe3db739ae243fb011514195b7099e72107f30", "6c9b13879818ebbfed9606a8bc45c7d3844dd61cd1ff0c0703a2fc63a4d72e67", [0xfffffffffffff795, 0xfff]}) inotify_init() ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f00000003c0)=0x1) 03:10:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f0000000240)) [ 270.683162] BTRFS error (device loop0): open_ctree failed [ 270.689087] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 838489955868 transid 756082810144684242 /dev/loop7 03:10:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x227e) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 270.793612] kvm: pic: single mode not supported [ 270.793634] kvm: pic: level sensitive irq not supported [ 270.799700] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 270.812366] BTRFS error (device loop7): superblock checksum mismatch 03:10:07 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '%eth0wlan0'}, {0x20, "2dba"}, {0x20, 'ppp1+user%'}, {0x20, 'vmnet1eth1'}, {0x20, '{bdev}#:'}, {0x20, '{'}], 0xa, "66242d26ba98a96806daa89093b540cdf63fd924af384a61fc3b4b3a3ada8f2bc0a6c0d63085a9f1e26af039b1a60998ea70b513aa52a8cbcf24228705045b36a27e"}, 0x7c) clone(0xbd319029ddd0a11b, &(0x7f00000006c0), &(0x7f0000000200), &(0x7f0000000040), &(0x7f0000000080)) 03:10:07 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:07 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266", 0x45, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(tea)\x00'}, 0x58) socketpair(0x5, 0x3, 0xffff, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_dccp_int(r2, 0x21, 0x11, &(0x7f0000000140)=0x1, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390d006dc80000009d4d54", 0x10) r3 = dup(r0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000001600)=""/32) io_setup(0x3, &(0x7f0000cadffc)=0x0) io_submit(r5, 0x1, &(0x7f0000000180)=[&(0x7f00004dbfc0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000391000)="83", 0x1}]) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256_mb\x00'}, 0x58) io_submit(r5, 0x6, &(0x7f00000015c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x1, r2, &(0x7f00000001c0)="b6d02326128704", 0x7, 0xc8, 0x0, 0x0, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x2f, r1, &(0x7f0000000240)="474fd66a58e5211f5044aaa8eb3abb8c486728cf342a32d2807d4e8d1ac4f3937e3c5b548e3e5cd252a101d8a8dbddeb8d9cd9ac9707ce65011045099b66ca651950b4f2963c0282c195299817cef0c8b994914bccc7c8f21806dc411350194478f3726593f14813781f2849d9bc84e6471dad8c238b43aefad92d0dce65df2db6eb3db1a4affb3e5f2c7d33730ea2c5aabf78f1bc61f2ca98fce7590c42216d75de093f2f22c0", 0xa7, 0x5c9, 0x0, 0x1, r3}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0xffffffff7fffffff, r1, &(0x7f0000000340)="5ecefa0a0d3928e10bba0f30f1aefbd92c4023d301739901e639685aeeae6411e9570cd17b14568d315d4a204a50760c403586d436ed0ef263b22a72b5ba6a30c38c5eb423775867d045b84348fa335f700f751bef30b00e4e07d50da0e490637ce78c361b02598b48400342e2d2f94de84133477f6ae17ce8d3e6f148070d7eae0a51fd4b5e3f9c69cbebe6787044b690e9a386acaf30a338cd66e7c87419", 0x9f, 0x851c, 0x0, 0x1, r3}, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x7, 0xffff, r4, &(0x7f0000000440)="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", 0x1000, 0x1a43, 0x0, 0x0, r1}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0xf, 0x7fff, r0, &(0x7f0000001480)="51bd59c21eba1b44eb5920430c838dbdfd03199eb184ba3e392f", 0x1a, 0x1400000000000000, 0x0, 0x1, r1}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x3, 0x7fffffff, r4, &(0x7f0000001500)="ee8caa0644a6ec36ca53f9a8cf587b8f203114182e2bbaa8738e88b59ecd8d16c05f6703e19b9c4f9c559ba06761255d761d0bcde02e51458ee5890687ff91c7dee302daf2e91dd052", 0x49, 0x0, 0x0, 0x0, r2}]) 03:10:07 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x227e) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 271.037331] FAULT_INJECTION: forcing a failure. [ 271.037331] name failslab, interval 1, probability 0, space 0, times 0 [ 271.048593] CPU: 1 PID: 13330 Comm: syz-executor2 Not tainted 4.18.0-rc4+ #142 [ 271.055965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.065334] Call Trace: [ 271.067944] dump_stack+0x1c9/0x2b4 [ 271.071570] ? dump_stack_print_info.cold.2+0x52/0x52 [ 271.076778] should_fail.cold.4+0xa/0x1a [ 271.080832] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.085932] ? __lock_acquire+0x7fc/0x5020 [ 271.090157] ? print_usage_bug+0xc0/0xc0 [ 271.094212] ? print_usage_bug+0xc0/0xc0 [ 271.098278] ? trace_hardirqs_on+0x10/0x10 [ 271.102504] ? __lock_acquire+0x7fc/0x5020 [ 271.106726] ? print_usage_bug+0xc0/0xc0 [ 271.110780] __should_failslab+0x124/0x180 [ 271.115011] should_failslab+0x9/0x14 [ 271.118982] kmem_cache_alloc+0x47/0x760 [ 271.123035] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 271.128910] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 271.134614] __radix_tree_create+0x4d6/0x840 [ 271.139024] ? radix_tree_maybe_preload_order+0x110/0x110 [ 271.144553] ? find_held_lock+0x36/0x1c0 [ 271.148618] ? graph_lock+0x170/0x170 [ 271.152413] ? __lock_is_held+0xb5/0x140 [ 271.156466] ? print_usage_bug+0xc0/0xc0 [ 271.160523] ? find_held_lock+0x36/0x1c0 [ 271.164585] __radix_tree_insert+0x107/0x8f0 [ 271.168984] ? graph_lock+0x170/0x170 [ 271.172788] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 271.177802] ? __radix_tree_create+0x840/0x840 [ 271.182373] ? lock_acquire+0x1e4/0x540 [ 271.186338] ? shmem_add_to_page_cache+0x49c/0xe00 [ 271.191273] ? lock_release+0xa30/0xa30 [ 271.195254] ? kasan_check_write+0x14/0x20 [ 271.199481] ? do_raw_spin_lock+0xc1/0x200 [ 271.203723] shmem_add_to_page_cache+0x988/0xe00 [ 271.208468] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 271.212865] ? shmem_put_link+0x280/0x280 [ 271.217021] ? percpu_ref_put_many+0x131/0x240 [ 271.221590] ? percpu_ref_tryget+0x2d0/0x2d0 [ 271.225990] ? mem_cgroup_try_charge+0x548/0xa70 [ 271.230748] ? mem_cgroup_protected+0xa60/0xa60 [ 271.235424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.240952] ? shmem_alloc_and_acct_page+0x31a/0x820 [ 271.246047] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 271.250705] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 271.255708] ? __radix_tree_preload+0x173/0x1d0 [ 271.260381] shmem_getpage_gfp+0x81b/0x41e0 [ 271.264712] ? shmem_writepage+0x1380/0x1380 [ 271.269119] ? print_usage_bug+0xc0/0xc0 [ 271.273169] ? __lock_acquire+0x7fc/0x5020 [ 271.277392] ? print_usage_bug+0xc0/0xc0 [ 271.281442] ? __lock_acquire+0x7fc/0x5020 [ 271.285674] ? print_usage_bug+0xc0/0xc0 [ 271.289723] ? __lock_acquire+0x7fc/0x5020 [ 271.293950] ? __lock_acquire+0x7fc/0x5020 [ 271.298182] ? check_noncircular+0x20/0x20 [ 271.302406] ? __lock_acquire+0x7fc/0x5020 [ 271.306641] ? __lock_acquire+0x7fc/0x5020 [ 271.310872] ? trace_hardirqs_on+0x10/0x10 [ 271.315094] ? print_usage_bug+0xc0/0xc0 [ 271.319142] ? __lock_acquire+0x7fc/0x5020 [ 271.323366] ? print_usage_bug+0xc0/0xc0 [ 271.327424] ? print_usage_bug+0xc0/0xc0 [ 271.331477] ? graph_lock+0x170/0x170 [ 271.335279] ? print_usage_bug+0xc0/0xc0 [ 271.339338] ? __lock_acquire+0x7fc/0x5020 [ 271.343564] ? __lock_acquire+0x7fc/0x5020 [ 271.347788] ? graph_lock+0x170/0x170 [ 271.351581] ? find_held_lock+0x36/0x1c0 [ 271.355635] ? print_usage_bug+0xc0/0xc0 [ 271.359699] ? lock_downgrade+0x8f0/0x8f0 [ 271.363845] ? kasan_check_read+0x11/0x20 [ 271.367982] ? lock_release+0xa30/0xa30 [ 271.371962] ? mark_held_locks+0xc9/0x160 [ 271.376103] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.381638] ? iov_iter_fault_in_readable+0x23d/0x460 [ 271.386826] ? copy_page_from_iter+0x890/0x890 [ 271.391395] ? __sanitizer_cov_trace_const_cmp1+0x1d/0x20 [ 271.396919] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 271.402100] shmem_write_begin+0x110/0x1e0 [ 271.406329] generic_perform_write+0x3ae/0x6c0 [ 271.410919] ? add_page_wait_queue+0x2c0/0x2c0 [ 271.415490] ? file_update_time+0xe4/0x640 [ 271.419727] ? current_time+0x1b0/0x1b0 [ 271.423700] ? down_write+0x8f/0x130 [ 271.427429] __generic_file_write_iter+0x26e/0x630 [ 271.432349] generic_file_write_iter+0x438/0x870 [ 271.437099] ? __generic_file_write_iter+0x630/0x630 [ 271.442194] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.447740] ? iov_iter_init+0xc9/0x1f0 [ 271.451704] __vfs_write+0x6c6/0x9f0 [ 271.455416] ? kernel_read+0x120/0x120 [ 271.459307] ? __lock_is_held+0xb5/0x140 [ 271.463367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.468892] ? __sb_start_write+0x17f/0x300 [ 271.473202] vfs_write+0x1f8/0x560 [ 271.476731] ksys_pwrite64+0x181/0x1b0 [ 271.480616] ? __ia32_sys_pread64+0xf0/0xf0 [ 271.484927] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 271.490450] ? fput+0x130/0x1a0 [ 271.493719] ? do_sys_ftruncate+0x44e/0x560 [ 271.498048] __x64_sys_pwrite64+0x97/0xf0 [ 271.502187] do_syscall_64+0x1b9/0x820 [ 271.506058] ? finish_task_switch+0x1d3/0x870 [ 271.510560] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.515475] ? syscall_return_slowpath+0x31d/0x5e0 [ 271.520395] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 271.525759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.530601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.535777] RIP: 0033:0x4100e7 [ 271.538947] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 271.558194] RSP: 002b:00007ff193aada80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 271.565900] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004100e7 [ 271.573156] RDX: 0000000000000049 RSI: 0000000020000500 RDI: 0000000000000014 [ 271.580423] RBP: 0000000000000000 R08: 0000000020000218 R09: 00000000fbad8001 03:10:08 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 271.587688] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 271.594940] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000005 [ 271.618360] IPVS: ftp: loaded support on port[0] = 21 03:10:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f25", 0x4e, 0x10000}], 0x0, &(0x7f0000000240)) [ 271.660219] BTRFS error (device loop7): open_ctree failed 03:10:08 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b7", 0xd2, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:08 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x227e) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 271.843841] IPVS: ftp: loaded support on port[0] = 21 03:10:08 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b7", 0xd2, 0x10000}], 0x0, &(0x7f0000000240)) [ 271.866475] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 271.873773] BTRFS error (device loop7): superblock checksum mismatch [ 271.918587] BTRFS error (device loop7): open_ctree failed 03:10:08 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:08 executing program 1: ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={{}, {0x77359400}}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000100)={0x6, 0x0, 0x5, 0x8}) 03:10:08 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b7", 0xd2, 0x10000}], 0x0, &(0x7f0000000240)) [ 272.116658] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 272.124059] BTRFS error (device loop7): superblock checksum mismatch [ 272.432361] BTRFS error (device loop7): open_ctree failed [ 272.442590] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 272.449814] BTRFS error (device loop7): superblock checksum mismatch [ 272.494365] BTRFS error (device loop7): open_ctree failed 03:10:10 executing program 4: setitimer(0x2, &(0x7f00000000c0), &(0x7f0000000100)) 03:10:10 executing program 5: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x227e) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:10 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce", 0xd4, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4800, 0x0) socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14}, @remote={0xac, 0x14, 0x223, 0xbb}, {[@rr={0xffffff94, 0x4}]}}, @icmp=@timestamp_reply={0xe}}}}}, &(0x7f0000000100)) 03:10:10 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 273.655403] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 273.662759] BTRFS error (device loop3): superblock checksum mismatch 03:10:10 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce", 0xd4, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:10 executing program 4: 03:10:10 executing program 1: [ 273.765099] BTRFS error (device loop3): open_ctree failed [ 273.794605] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 273.801924] BTRFS error (device loop3): superblock checksum mismatch 03:10:10 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 273.885321] BTRFS error (device loop3): open_ctree failed 03:10:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fc", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:10 executing program 4: 03:10:10 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce", 0xd4, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:10 executing program 1: 03:10:10 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x227e) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='\ntrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:10 executing program 4: [ 274.087842] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 2530879793048935964 transid 756082810144684242 /dev/loop7 03:10:10 executing program 1: 03:10:10 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f8", 0x4a, 0x10000}], 0x0, &(0x7f0000000240)) [ 274.259253] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 274.266513] BTRFS error (device loop7): superblock checksum mismatch 03:10:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000500)="025cc83d6d345f8f762070") syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "de419d", 0x8, 0x88, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 03:10:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:11 executing program 1: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0x10) 03:10:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 274.369070] BTRFS error (device loop7): open_ctree failed 03:10:11 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 274.434538] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 274.441880] BTRFS error (device loop7): superblock checksum mismatch 03:10:11 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55", 0xd5, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:11 executing program 1: 03:10:11 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x227e) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:11 executing program 4: [ 274.513384] BTRFS error (device loop7): open_ctree failed [ 274.542657] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 274.549948] BTRFS error (device loop7): superblock checksum mismatch 03:10:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f8", 0x4a, 0x10000}], 0x0, &(0x7f0000000240)) [ 274.649197] BTRFS error (device loop7): open_ctree failed 03:10:11 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55", 0xd5, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='.trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:11 executing program 1: 03:10:11 executing program 4: 03:10:11 executing program 1: 03:10:11 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 274.798170] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 274.805468] BTRFS error (device loop3): superblock checksum mismatch 03:10:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='/trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 274.908085] BTRFS error (device loop3): open_ctree failed [ 274.979601] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 274.986871] BTRFS error (device loop3): superblock checksum mismatch 03:10:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:11 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x227e) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:11 executing program 4: 03:10:11 executing program 1: 03:10:11 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 275.022847] BTRFS error (device loop3): open_ctree failed [ 275.047526] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 275.054791] BTRFS error (device loop3): superblock checksum mismatch 03:10:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f8", 0x4a, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:11 executing program 1: 03:10:11 executing program 4: 03:10:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='b/rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 275.168152] BTRFS error (device loop3): open_ctree failed [ 275.263309] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 275.270588] BTRFS error (device loop3): superblock checksum mismatch 03:10:12 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55", 0xd5, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:12 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 275.353873] BTRFS error (device loop3): open_ctree failed [ 275.391142] BTRFS error (device loop3): unsupported checksum algorithm 3786 03:10:12 executing program 1: 03:10:12 executing program 4: [ 275.398409] BTRFS error (device loop3): superblock checksum mismatch 03:10:12 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 275.489318] BTRFS error (device loop3): open_ctree failed 03:10:12 executing program 1: 03:10:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='b\nrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:12 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) [ 275.538902] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 275.546247] BTRFS error (device loop3): superblock checksum mismatch 03:10:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:12 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 275.611143] BTRFS error (device loop3): open_ctree failed 03:10:12 executing program 1: socket$inet(0x2, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @rand_addr}, &(0x7f0000000040)=0x10) [ 275.679723] print_req_error: I/O error, dev loop7, sector 128 [ 275.694507] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 275.701735] BTRFS error (device loop3): superblock checksum mismatch 03:10:12 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6}], 0x0, &(0x7f0000000240)) 03:10:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:12 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x400, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/164, &(0x7f00000001c0)=0xa4) [ 275.805087] BTRFS error (device loop3): open_ctree failed 03:10:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) [ 275.854868] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 275.862214] BTRFS error (device loop3): superblock checksum mismatch 03:10:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 275.987540] BTRFS error (device loop3): open_ctree failed 03:10:12 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:12 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6}], 0x0, &(0x7f0000000240)) 03:10:12 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x6}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000740)="d9", 0x1}], 0x1, &(0x7f00000017c0)=ANY=[], 0x0, 0x4004000}, 0x20004040) 03:10:12 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9204, 0xf0b1) 03:10:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='bt/fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) [ 276.102850] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 276.110234] BTRFS error (device loop3): superblock checksum mismatch [ 276.117170] BTRFS error (device loop3): open_ctree failed [ 276.126369] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 276.133549] BTRFS error (device loop3): superblock checksum mismatch [ 276.151545] BTRFS error (device loop3): open_ctree failed 03:10:12 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 276.286639] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 276.293928] BTRFS error (device loop3): superblock checksum mismatch 03:10:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:13 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6}], 0x0, &(0x7f0000000240)) 03:10:13 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9204, 0xf0b1) 03:10:13 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 276.380767] syz-executor4 (13762) used greatest stack depth: 13576 bytes left 03:10:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='bt\nfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 276.504630] BTRFS error (device loop3): open_ctree failed 03:10:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) 03:10:13 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 276.545170] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 276.552393] BTRFS error (device loop3): superblock checksum mismatch 03:10:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="627472667305", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:13 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f8", 0x4a, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:13 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 276.631425] BTRFS error (device loop3): open_ctree failed 03:10:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 276.675672] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 276.682936] BTRFS error (device loop3): superblock checksum mismatch [ 276.690341] BTRFS error (device loop3): open_ctree failed [ 276.706373] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 276.713615] BTRFS error (device loop3): superblock checksum mismatch 03:10:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='bt%fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 276.845740] BTRFS error (device loop3): open_ctree failed [ 276.881725] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 276.889005] BTRFS error (device loop3): superblock checksum mismatch [ 276.995957] BTRFS error (device loop3): open_ctree failed 03:10:13 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:13 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:13 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce", 0xd4, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:13 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) [ 277.147540] FAULT_INJECTION: forcing a failure. [ 277.147540] name failslab, interval 1, probability 0, space 0, times 0 [ 277.158896] CPU: 1 PID: 13873 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #142 [ 277.166276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.175641] Call Trace: [ 277.178255] dump_stack+0x1c9/0x2b4 [ 277.181899] ? dump_stack_print_info.cold.2+0x52/0x52 [ 277.187122] should_fail.cold.4+0xa/0x1a [ 277.191199] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.196315] ? lock_downgrade+0x8f0/0x8f0 [ 277.200474] ? proc_fail_nth_write+0x9e/0x210 [ 277.204975] ? proc_cwd_link+0x1d0/0x1d0 [ 277.209050] ? find_held_lock+0x36/0x1c0 [ 277.213137] ? check_same_owner+0x340/0x340 [ 277.217476] ? rcu_note_context_switch+0x730/0x730 [ 277.222424] __should_failslab+0x124/0x180 [ 277.226676] should_failslab+0x9/0x14 [ 277.230487] __kmalloc+0x2c8/0x760 [ 277.234038] ? strncpy_from_user+0x510/0x510 [ 277.238459] ? fput+0x130/0x1a0 [ 277.241754] ? __x64_sys_memfd_create+0x142/0x4f0 03:10:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:13 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 277.246613] __x64_sys_memfd_create+0x142/0x4f0 [ 277.251296] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 277.256849] ? memfd_fcntl+0x1400/0x1400 [ 277.260933] ? do_syscall_64+0x9a/0x820 [ 277.265026] do_syscall_64+0x1b9/0x820 [ 277.268929] ? finish_task_switch+0x1d3/0x870 [ 277.273439] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.278380] ? syscall_return_slowpath+0x31d/0x5e0 [ 277.283329] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 277.288712] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:10:14 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 277.293576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.298769] RIP: 0033:0x455e29 [ 277.301953] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.321316] RSP: 002b:00007f7d4230aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 277.329054] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 277.336339] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 277.343625] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 277.350908] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 277.358183] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000000 [ 277.384322] print_req_error: I/O error, dev loop2, sector 128 [ 277.436797] print_req_error: I/O error, dev loop0, sector 128 [ 277.452140] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 277.459466] BTRFS error (device loop7): superblock checksum mismatch 03:10:14 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btr\ns\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:14 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) [ 277.493376] BTRFS error (device loop7): open_ctree failed [ 277.523620] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 277.530950] BTRFS error (device loop7): superblock checksum mismatch 03:10:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 277.562926] BTRFS error (device loop7): open_ctree failed [ 277.653204] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 277.660487] BTRFS error (device loop6): superblock checksum mismatch [ 277.675483] FAULT_INJECTION: forcing a failure. [ 277.675483] name failslab, interval 1, probability 0, space 0, times 0 [ 277.686908] CPU: 0 PID: 13917 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #142 [ 277.694281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.703639] Call Trace: [ 277.706246] dump_stack+0x1c9/0x2b4 [ 277.709889] ? dump_stack_print_info.cold.2+0x52/0x52 [ 277.715093] ? print_usage_bug+0xc0/0xc0 [ 277.719181] should_fail.cold.4+0xa/0x1a [ 277.723260] ? trace_hardirqs_on+0x10/0x10 [ 277.727517] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.732641] ? find_held_lock+0x36/0x1c0 [ 277.736727] ? find_held_lock+0x36/0x1c0 [ 277.740822] ? check_same_owner+0x340/0x340 [ 277.745158] ? rcu_note_context_switch+0x730/0x730 [ 277.750128] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 277.755176] __should_failslab+0x124/0x180 [ 277.759414] should_failslab+0x9/0x14 [ 277.763212] kmem_cache_alloc+0x2af/0x760 [ 277.767355] __d_alloc+0xc8/0xd50 [ 277.770816] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 277.775820] ? do_raw_spin_unlock+0xa7/0x2f0 [ 277.780228] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 277.784814] ? __lock_is_held+0xb5/0x140 [ 277.788888] ? _raw_spin_unlock+0x22/0x30 [ 277.793040] ? __alloc_fd+0x34e/0x710 [ 277.796841] ? exit_files+0xb0/0xb0 [ 277.800461] d_alloc_pseudo+0x1d/0x30 [ 277.804249] __shmem_file_setup+0x1f3/0x700 [ 277.808573] ? check_same_owner+0x340/0x340 [ 277.812884] ? shmem_fill_super+0xa50/0xa50 [ 277.817209] ? get_unused_fd_flags+0x122/0x1a0 [ 277.821786] ? __alloc_fd+0x710/0x710 [ 277.825589] shmem_file_setup+0x2f/0x40 [ 277.829555] __x64_sys_memfd_create+0x2af/0x4f0 [ 277.834212] ? memfd_fcntl+0x1400/0x1400 [ 277.838263] ? do_syscall_64+0x9a/0x820 [ 277.842229] do_syscall_64+0x1b9/0x820 [ 277.846105] ? syscall_slow_exit_work+0x500/0x500 [ 277.850950] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.855868] ? syscall_return_slowpath+0x31d/0x5e0 [ 277.860802] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 277.866169] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.871005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.876191] RIP: 0033:0x455e29 [ 277.879366] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:10:14 executing program 7: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x20942, 0x0) close(r0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x28000) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)={0x303, 0x33}, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='io\x00') sendfile(r2, r3, &(0x7f0000000500)=0x8f, 0xdfd7) openat$cgroup_int(r1, &(0x7f0000000140)='memory.swap.max\x00', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000000)={0x7ff, 0x3, 0x2, 0x6, 0x6}) sendfile(r3, r2, &(0x7f00000000c0)=0x53, 0x100000001) 03:10:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 277.898598] RSP: 002b:00007f7d4230aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 277.906296] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 277.913564] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 277.920836] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 277.928179] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 277.935448] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000001 [ 278.079231] BTRFS error (device loop6): open_ctree failed [ 278.117213] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 278.124455] BTRFS error (device loop3): superblock checksum mismatch 03:10:14 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:14 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:14 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000080), &(0x7f0000001ac0)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'\x00', r1}) 03:10:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btr%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 278.165268] BTRFS error (device loop3): open_ctree failed 03:10:15 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 278.241050] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 278.248396] BTRFS error (device loop3): superblock checksum mismatch [ 278.270878] BTRFS error (device loop3): open_ctree failed 03:10:15 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 278.298196] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 278.305502] BTRFS error (device loop6): superblock checksum mismatch 03:10:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:15 executing program 7: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x6000) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x3ffc, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000040)=0x8b24831) r3 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000340)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}) [ 278.382747] BTRFS error (device loop6): open_ctree failed [ 278.500429] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 278.507678] BTRFS error (device loop3): superblock checksum mismatch [ 278.524019] FAULT_INJECTION: forcing a failure. [ 278.524019] name failslab, interval 1, probability 0, space 0, times 0 [ 278.535368] CPU: 0 PID: 13996 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #142 [ 278.543276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.552648] Call Trace: [ 278.555274] dump_stack+0x1c9/0x2b4 [ 278.558940] ? dump_stack_print_info.cold.2+0x52/0x52 [ 278.564134] ? __kernel_text_address+0xd/0x40 [ 278.568651] should_fail.cold.4+0xa/0x1a [ 278.572728] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.577825] ? save_stack+0xa9/0xd0 [ 278.581440] ? save_stack+0x43/0xd0 [ 278.585068] ? kasan_kmalloc+0xc4/0xe0 [ 278.588961] ? kasan_slab_alloc+0x12/0x20 [ 278.593107] ? kmem_cache_alloc+0x12e/0x760 [ 278.597416] ? __d_alloc+0xc8/0xd50 [ 278.601044] ? d_alloc_pseudo+0x1d/0x30 [ 278.605025] ? __shmem_file_setup+0x1f3/0x700 [ 278.609509] ? shmem_file_setup+0x2f/0x40 [ 278.613648] ? find_held_lock+0x36/0x1c0 [ 278.617727] ? check_same_owner+0x340/0x340 [ 278.622045] ? rcu_note_context_switch+0x730/0x730 [ 278.626964] ? kasan_check_read+0x11/0x20 [ 278.631105] __should_failslab+0x124/0x180 [ 278.635349] should_failslab+0x9/0x14 [ 278.639151] kmem_cache_alloc+0x2af/0x760 [ 278.643314] ? rcu_read_lock_sched_held+0x108/0x120 [ 278.648332] ? kmem_cache_alloc+0x5fa/0x760 [ 278.652640] ? shmem_destroy_callback+0xc0/0xc0 [ 278.657299] shmem_alloc_inode+0x1b/0x40 [ 278.661346] alloc_inode+0x63/0x190 [ 278.664963] new_inode_pseudo+0x71/0x1a0 [ 278.669015] ? prune_icache_sb+0x1b0/0x1b0 [ 278.673255] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 278.678270] new_inode+0x1c/0x40 [ 278.681641] shmem_get_inode+0xf1/0x910 [ 278.685606] ? shmem_encode_fh+0x340/0x340 [ 278.689829] ? _raw_spin_unlock+0x22/0x30 [ 278.693974] ? __alloc_fd+0x34e/0x710 [ 278.697765] ? exit_files+0xb0/0xb0 [ 278.701395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.706942] __shmem_file_setup+0x259/0x700 [ 278.711249] ? check_same_owner+0x340/0x340 [ 278.715558] ? shmem_fill_super+0xa50/0xa50 [ 278.719886] ? get_unused_fd_flags+0x122/0x1a0 [ 278.724453] ? __alloc_fd+0x710/0x710 [ 278.728253] shmem_file_setup+0x2f/0x40 [ 278.732223] __x64_sys_memfd_create+0x2af/0x4f0 [ 278.736879] ? memfd_fcntl+0x1400/0x1400 [ 278.740941] ? do_syscall_64+0x9a/0x820 [ 278.744915] do_syscall_64+0x1b9/0x820 [ 278.748793] ? syscall_return_slowpath+0x5e0/0x5e0 [ 278.753708] ? syscall_return_slowpath+0x31d/0x5e0 [ 278.758627] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 278.763992] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.768827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.774004] RIP: 0033:0x455e29 [ 278.777182] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:10:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 278.796421] RSP: 002b:00007f7d4230aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 278.804115] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 278.811369] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 278.818626] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 278.825880] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 278.833132] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000002 03:10:15 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 278.964944] BTRFS error (device loop3): open_ctree failed [ 279.005879] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 279.013210] BTRFS error (device loop6): superblock checksum mismatch 03:10:15 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x3, 0xff) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0xfffffffffffffddc) 03:10:15 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:15 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) [ 279.068198] BTRFS error (device loop6): open_ctree failed [ 279.086999] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 279.094334] BTRFS error (device loop6): superblock checksum mismatch 03:10:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:15 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 279.160780] BTRFS error (device loop6): open_ctree failed 03:10:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="62747266730f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f00000000c0), &(0x7f0000000200)) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e22, 0x1, @empty, 0x4d7c}, {0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0xd}}, 0x3, [0x6, 0x0, 0x101, 0x3a3e, 0xffffffff00000000, 0xfffffffffffff001, 0x0, 0x160]}, 0x5c) mknod(&(0x7f0000000180)='./file0\x00', 0x20000000000103e, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000440), &(0x7f00000007c0)) r1 = gettid() kcmp(r1, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) clone(0x0, &(0x7f0000000380), &(0x7f00000005c0), &(0x7f0000001880), &(0x7f0000000380)) open$dir(&(0x7f00000001c0)='./file0\x00', 0x282, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e23, 0x7ff, @mcast1={0xff, 0x1, [], 0x1}, 0x6}, {0xa, 0x4e24, 0x1f, @remote={0xfe, 0x80, [], 0xbb}, 0xc984}, 0xed8, [0x2, 0x7, 0x1f, 0x80, 0x8, 0xffffffff, 0x7, 0xb54]}, 0x5c) [ 279.252021] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 279.254497] FAULT_INJECTION: forcing a failure. [ 279.254497] name failslab, interval 1, probability 0, space 0, times 0 [ 279.259318] BTRFS error (device loop6): superblock checksum mismatch [ 279.277316] CPU: 1 PID: 14048 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #142 [ 279.284689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.294057] Call Trace: [ 279.296651] dump_stack+0x1c9/0x2b4 [ 279.300276] ? dump_stack_print_info.cold.2+0x52/0x52 [ 279.305472] ? __lock_acquire+0x7fc/0x5020 [ 279.309709] should_fail.cold.4+0xa/0x1a [ 279.313764] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.318875] ? find_held_lock+0x36/0x1c0 [ 279.322934] ? graph_lock+0x170/0x170 [ 279.326748] ? find_held_lock+0x36/0x1c0 [ 279.330822] ? check_same_owner+0x340/0x340 [ 279.335132] ? graph_lock+0x170/0x170 [ 279.338921] ? rcu_note_context_switch+0x730/0x730 [ 279.343839] ? kasan_check_read+0x11/0x20 [ 279.347974] __should_failslab+0x124/0x180 [ 279.352198] should_failslab+0x9/0x14 [ 279.355988] kmem_cache_alloc+0x2af/0x760 [ 279.360139] ? find_held_lock+0x36/0x1c0 [ 279.364204] get_empty_filp+0x12d/0x530 [ 279.368180] ? proc_nr_files+0x60/0x60 [ 279.372070] ? kasan_check_read+0x11/0x20 [ 279.376208] ? do_raw_spin_unlock+0xa7/0x2f0 [ 279.380606] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 279.385179] ? kasan_check_write+0x14/0x20 [ 279.389398] ? do_raw_spin_lock+0xc1/0x200 [ 279.393621] alloc_file+0x24/0x3e0 [ 279.397149] ? clear_nlink.part.9+0x65/0x80 [ 279.401465] __shmem_file_setup+0x313/0x700 [ 279.405774] ? check_same_owner+0x340/0x340 [ 279.410085] ? shmem_fill_super+0xa50/0xa50 [ 279.414396] ? get_unused_fd_flags+0x122/0x1a0 [ 279.418961] ? __alloc_fd+0x710/0x710 [ 279.422753] shmem_file_setup+0x2f/0x40 [ 279.426736] __x64_sys_memfd_create+0x2af/0x4f0 [ 279.431405] ? memfd_fcntl+0x1400/0x1400 [ 279.435454] ? do_syscall_64+0x9a/0x820 [ 279.439417] do_syscall_64+0x1b9/0x820 [ 279.443289] ? finish_task_switch+0x1d3/0x870 [ 279.447783] ? syscall_return_slowpath+0x5e0/0x5e0 [ 279.452698] ? syscall_return_slowpath+0x31d/0x5e0 [ 279.457628] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 279.462983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.467820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.473007] RIP: 0033:0x455e29 [ 279.476185] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.495426] RSP: 002b:00007f7d4230aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 279.503129] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 279.510384] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 279.517638] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 279.524894] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 279.532150] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000003 03:10:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 03:10:16 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 279.675238] BTRFS error (device loop6): open_ctree failed 03:10:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 03:10:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 279.794336] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 279.801627] BTRFS error (device loop6): superblock checksum mismatch 03:10:16 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 279.836870] BTRFS error (device loop6): open_ctree failed 03:10:16 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:16 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:16 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 279.969889] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 279.977164] BTRFS error (device loop3): superblock checksum mismatch [ 280.001980] BTRFS error (device loop3): open_ctree failed [ 280.115820] FAULT_INJECTION: forcing a failure. [ 280.115820] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 280.129752] CPU: 1 PID: 14123 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #142 [ 280.137124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.146507] Call Trace: [ 280.149134] dump_stack+0x1c9/0x2b4 [ 280.152787] ? dump_stack_print_info.cold.2+0x52/0x52 [ 280.158016] ? __radix_tree_lookup+0x3dd/0x6e0 03:10:16 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 280.162621] should_fail.cold.4+0xa/0x1a [ 280.166710] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.171831] ? graph_lock+0x170/0x170 [ 280.175661] ? find_held_lock+0x36/0x1c0 [ 280.179736] ? find_held_lock+0x36/0x1c0 [ 280.183835] ? __lock_is_held+0xb5/0x140 [ 280.187918] ? check_same_owner+0x340/0x340 [ 280.192256] ? rcu_note_context_switch+0x730/0x730 [ 280.197208] __alloc_pages_nodemask+0x36e/0xdb0 [ 280.201895] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 280.206931] ? trace_hardirqs_on+0x10/0x10 [ 280.211188] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 280.216212] ? percpu_counter_add_batch+0xf2/0x150 [ 280.221168] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 280.226196] ? __vm_enough_memory+0x590/0x980 [ 280.230705] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 280.236247] alloc_pages_vma+0xdd/0x540 [ 280.240215] shmem_alloc_page+0xa8/0x190 [ 280.244274] ? shmem_swapin+0x230/0x230 [ 280.248248] ? print_usage_bug+0xc0/0xc0 [ 280.252324] shmem_alloc_and_acct_page+0x1f1/0x820 [ 280.257244] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 280.261912] shmem_getpage_gfp+0x6ea/0x41e0 [ 280.266230] ? print_usage_bug+0xc0/0xc0 [ 280.270291] ? shmem_writepage+0x1380/0x1380 [ 280.274687] ? print_usage_bug+0xc0/0xc0 [ 280.278870] ? __lock_acquire+0x7fc/0x5020 [ 280.283107] ? print_usage_bug+0xc0/0xc0 [ 280.287159] ? __lock_acquire+0x7fc/0x5020 [ 280.291478] ? print_usage_bug+0xc0/0xc0 [ 280.295525] ? __lock_acquire+0x7fc/0x5020 [ 280.299748] ? __lock_acquire+0x7fc/0x5020 [ 280.303974] ? check_noncircular+0x20/0x20 [ 280.308197] ? __lock_acquire+0x7fc/0x5020 [ 280.312432] ? __lock_acquire+0x7fc/0x5020 [ 280.316666] ? trace_hardirqs_on+0x10/0x10 [ 280.320886] ? print_usage_bug+0xc0/0xc0 [ 280.324936] ? __lock_acquire+0x7fc/0x5020 [ 280.329172] ? print_usage_bug+0xc0/0xc0 [ 280.333223] ? print_usage_bug+0xc0/0xc0 [ 280.337273] ? graph_lock+0x170/0x170 [ 280.341065] ? print_usage_bug+0xc0/0xc0 [ 280.345113] ? __lock_acquire+0x7fc/0x5020 [ 280.349349] ? __lock_acquire+0x7fc/0x5020 [ 280.353593] ? graph_lock+0x170/0x170 [ 280.357388] ? find_held_lock+0x36/0x1c0 [ 280.361464] ? print_usage_bug+0xc0/0xc0 [ 280.365518] ? lock_downgrade+0x8f0/0x8f0 [ 280.369654] ? kasan_check_read+0x11/0x20 [ 280.374653] ? lock_release+0xa30/0xa30 [ 280.378647] ? mark_held_locks+0xc9/0x160 [ 280.382788] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.388325] ? iov_iter_fault_in_readable+0x23d/0x460 [ 280.393513] ? copy_page_from_iter+0x890/0x890 [ 280.398083] ? __sanitizer_cov_trace_const_cmp1+0x1d/0x20 [ 280.403610] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 280.408796] shmem_write_begin+0x110/0x1e0 [ 280.413032] generic_perform_write+0x3ae/0x6c0 [ 280.417640] ? add_page_wait_queue+0x2c0/0x2c0 [ 280.422216] ? file_update_time+0xe4/0x640 [ 280.426440] ? current_time+0x1b0/0x1b0 [ 280.430409] ? down_write+0x8f/0x130 [ 280.434117] __generic_file_write_iter+0x26e/0x630 [ 280.439043] generic_file_write_iter+0x438/0x870 [ 280.443791] ? __generic_file_write_iter+0x630/0x630 [ 280.448888] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.454424] ? iov_iter_init+0xc9/0x1f0 [ 280.458403] __vfs_write+0x6c6/0x9f0 [ 280.462118] ? kernel_read+0x120/0x120 [ 280.466009] ? __lock_is_held+0xb5/0x140 [ 280.470070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.475609] ? __sb_start_write+0x17f/0x300 [ 280.479925] vfs_write+0x1f8/0x560 [ 280.483457] ksys_pwrite64+0x181/0x1b0 [ 280.487333] ? __ia32_sys_pread64+0xf0/0xf0 [ 280.491664] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 280.497202] ? fput+0x130/0x1a0 [ 280.500482] ? do_sys_ftruncate+0x44e/0x560 [ 280.504803] __x64_sys_pwrite64+0x97/0xf0 [ 280.508941] do_syscall_64+0x1b9/0x820 [ 280.512818] ? finish_task_switch+0x1d3/0x870 [ 280.517303] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.522220] ? syscall_return_slowpath+0x31d/0x5e0 [ 280.527154] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 280.532508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.537345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.542531] RIP: 0033:0x4100e7 [ 280.545707] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 03:10:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf/\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:17 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 280.564934] RSP: 002b:00007f7d4230aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 280.572634] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004100e7 [ 280.579890] RDX: 00000000000000d6 RSI: 0000000020000500 RDI: 0000000000000014 [ 280.587159] RBP: 0000000000000000 R08: 0000000020000218 R09: 00000000fbad8001 [ 280.594423] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 280.601678] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000004 [ 280.633607] FAULT_INJECTION: forcing a failure. [ 280.633607] name failslab, interval 1, probability 0, space 0, times 0 [ 280.644980] CPU: 0 PID: 14130 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #142 [ 280.652361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.659783] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 280.661722] Call Trace: [ 280.661751] dump_stack+0x1c9/0x2b4 [ 280.661774] ? dump_stack_print_info.cold.2+0x52/0x52 [ 280.661803] should_fail.cold.4+0xa/0x1a [ 280.661827] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.668965] BTRFS error (device loop3): superblock checksum mismatch [ 280.671521] ? lock_downgrade+0x8f0/0x8f0 [ 280.671543] ? proc_fail_nth_write+0x9e/0x210 [ 280.671562] ? proc_cwd_link+0x1d0/0x1d0 [ 280.708686] ? find_held_lock+0x36/0x1c0 [ 280.712799] ? check_same_owner+0x340/0x340 [ 280.717131] ? rcu_note_context_switch+0x730/0x730 [ 280.722066] __should_failslab+0x124/0x180 [ 280.726369] should_failslab+0x9/0x14 [ 280.730158] __kmalloc+0x2c8/0x760 [ 280.733687] ? strncpy_from_user+0x510/0x510 [ 280.738105] ? fput+0x130/0x1a0 [ 280.741385] ? __x64_sys_memfd_create+0x142/0x4f0 [ 280.746230] __x64_sys_memfd_create+0x142/0x4f0 [ 280.750898] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 280.756423] ? memfd_fcntl+0x1400/0x1400 [ 280.760475] ? do_syscall_64+0x9a/0x820 [ 280.764439] do_syscall_64+0x1b9/0x820 [ 280.768316] ? finish_task_switch+0x1d3/0x870 [ 280.772821] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.777751] ? syscall_return_slowpath+0x31d/0x5e0 [ 280.782683] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 280.788050] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.792901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.798097] RIP: 0033:0x455e29 [ 280.801279] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.820521] RSP: 002b:00007f53b7997a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 280.828218] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 280.835473] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 280.842729] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 280.849982] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 280.857247] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000000 03:10:17 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:17 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:17 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:17 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:17 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 281.091209] BTRFS error (device loop3): open_ctree failed [ 281.139134] FAULT_INJECTION: forcing a failure. [ 281.139134] name failslab, interval 1, probability 0, space 0, times 0 [ 281.150398] CPU: 1 PID: 14170 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #142 [ 281.157756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.167121] Call Trace: [ 281.169710] dump_stack+0x1c9/0x2b4 [ 281.173327] ? dump_stack_print_info.cold.2+0x52/0x52 [ 281.178514] should_fail.cold.4+0xa/0x1a [ 281.182585] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.187702] ? __lock_acquire+0x7fc/0x5020 [ 281.191928] ? print_usage_bug+0xc0/0xc0 [ 281.195994] ? print_usage_bug+0xc0/0xc0 [ 281.200045] ? trace_hardirqs_on+0x10/0x10 [ 281.204268] ? lock_downgrade+0x8f0/0x8f0 [ 281.208404] ? __lock_acquire+0x7fc/0x5020 [ 281.212627] ? print_usage_bug+0xc0/0xc0 [ 281.216691] __should_failslab+0x124/0x180 [ 281.220929] should_failslab+0x9/0x14 [ 281.224726] kmem_cache_alloc+0x47/0x760 [ 281.228789] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 281.234667] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 281.240371] __radix_tree_create+0x4d6/0x840 [ 281.244781] ? radix_tree_maybe_preload_order+0x110/0x110 [ 281.250317] ? find_held_lock+0x36/0x1c0 [ 281.254364] ? graph_lock+0x170/0x170 [ 281.258150] ? __lock_is_held+0xb5/0x140 [ 281.262199] ? print_usage_bug+0xc0/0xc0 [ 281.266257] ? find_held_lock+0x36/0x1c0 [ 281.270320] __radix_tree_insert+0x107/0x8f0 [ 281.274718] ? graph_lock+0x170/0x170 [ 281.278523] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 281.283529] ? __radix_tree_create+0x840/0x840 [ 281.288105] ? lock_acquire+0x1e4/0x540 [ 281.292071] ? shmem_add_to_page_cache+0x49c/0xe00 [ 281.296994] ? lock_release+0xa30/0xa30 [ 281.300963] ? kasan_check_write+0x14/0x20 [ 281.305186] ? do_raw_spin_lock+0xc1/0x200 [ 281.309410] shmem_add_to_page_cache+0x988/0xe00 [ 281.314162] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 281.318564] ? shmem_put_link+0x280/0x280 [ 281.322707] ? percpu_ref_put_many+0x131/0x240 [ 281.327286] ? percpu_ref_tryget+0x2d0/0x2d0 [ 281.331688] ? mem_cgroup_try_charge+0x548/0xa70 [ 281.336442] ? mem_cgroup_protected+0xa60/0xa60 [ 281.341106] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 281.346630] ? shmem_alloc_and_acct_page+0x31a/0x820 [ 281.351732] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 281.356390] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 281.361392] ? __radix_tree_preload+0x173/0x1d0 [ 281.366056] shmem_getpage_gfp+0x81b/0x41e0 [ 281.370375] ? shmem_writepage+0x1380/0x1380 [ 281.374781] ? print_usage_bug+0xc0/0xc0 [ 281.378831] ? __lock_acquire+0x7fc/0x5020 [ 281.383056] ? print_usage_bug+0xc0/0xc0 [ 281.387120] ? __lock_acquire+0x7fc/0x5020 [ 281.391353] ? print_usage_bug+0xc0/0xc0 [ 281.395400] ? __lock_acquire+0x7fc/0x5020 [ 281.399619] ? __lock_acquire+0x7fc/0x5020 [ 281.403840] ? check_noncircular+0x20/0x20 [ 281.408064] ? __lock_acquire+0x7fc/0x5020 [ 281.412298] ? __lock_acquire+0x7fc/0x5020 [ 281.416529] ? trace_hardirqs_on+0x10/0x10 [ 281.420751] ? print_usage_bug+0xc0/0xc0 [ 281.424809] ? __lock_acquire+0x7fc/0x5020 [ 281.429036] ? print_usage_bug+0xc0/0xc0 [ 281.433088] ? print_usage_bug+0xc0/0xc0 [ 281.437150] ? graph_lock+0x170/0x170 [ 281.440941] ? print_usage_bug+0xc0/0xc0 [ 281.445000] ? __lock_acquire+0x7fc/0x5020 [ 281.449243] ? __lock_acquire+0x7fc/0x5020 [ 281.453467] ? graph_lock+0x170/0x170 [ 281.457263] ? find_held_lock+0x36/0x1c0 [ 281.461315] ? print_usage_bug+0xc0/0xc0 [ 281.465378] ? lock_downgrade+0x8f0/0x8f0 [ 281.469517] ? kasan_check_read+0x11/0x20 [ 281.473659] ? lock_release+0xa30/0xa30 [ 281.477716] ? mark_held_locks+0xc9/0x160 [ 281.481855] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 281.487382] ? iov_iter_fault_in_readable+0x23d/0x460 [ 281.492557] ? copy_page_from_iter+0x890/0x890 [ 281.497135] ? __sanitizer_cov_trace_const_cmp1+0x1d/0x20 [ 281.502670] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 281.507854] shmem_write_begin+0x110/0x1e0 [ 281.512094] generic_perform_write+0x3ae/0x6c0 [ 281.516759] ? add_page_wait_queue+0x2c0/0x2c0 [ 281.521329] ? file_update_time+0xe4/0x640 [ 281.525552] ? current_time+0x1b0/0x1b0 [ 281.529523] ? down_write+0x8f/0x130 [ 281.533243] __generic_file_write_iter+0x26e/0x630 [ 281.538175] generic_file_write_iter+0x438/0x870 [ 281.542925] ? __generic_file_write_iter+0x630/0x630 [ 281.548034] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 281.553560] ? iov_iter_init+0xc9/0x1f0 [ 281.557527] __vfs_write+0x6c6/0x9f0 [ 281.561238] ? kernel_read+0x120/0x120 [ 281.565114] ? __lock_is_held+0xb5/0x140 [ 281.569181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.574706] ? __sb_start_write+0x17f/0x300 [ 281.579035] vfs_write+0x1f8/0x560 [ 281.582565] ksys_pwrite64+0x181/0x1b0 [ 281.586442] ? __ia32_sys_pread64+0xf0/0xf0 [ 281.590750] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 281.596274] ? fput+0x130/0x1a0 [ 281.599550] ? do_sys_ftruncate+0x44e/0x560 [ 281.603863] __x64_sys_pwrite64+0x97/0xf0 [ 281.608027] do_syscall_64+0x1b9/0x820 [ 281.611910] ? finish_task_switch+0x1d3/0x870 [ 281.616407] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.621325] ? syscall_return_slowpath+0x31d/0x5e0 [ 281.626258] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 281.631613] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.636450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.641625] RIP: 0033:0x4100e7 [ 281.644808] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 281.664059] RSP: 002b:00007f7d4230aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 281.671764] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004100e7 [ 281.679035] RDX: 00000000000000d6 RSI: 0000000020000500 RDI: 0000000000000014 [ 281.686289] RBP: 0000000000000000 R08: 0000000020000218 R09: 00000000fbad8001 [ 281.693552] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 281.700818] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000005 [ 281.740920] FAULT_INJECTION: forcing a failure. [ 281.740920] name failslab, interval 1, probability 0, space 0, times 0 [ 281.752308] CPU: 0 PID: 14177 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #142 [ 281.759685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.769051] Call Trace: [ 281.771661] dump_stack+0x1c9/0x2b4 [ 281.775312] ? dump_stack_print_info.cold.2+0x52/0x52 [ 281.780524] ? print_usage_bug+0xc0/0xc0 [ 281.784613] should_fail.cold.4+0xa/0x1a 03:10:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:18 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000100)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="8c97a422c2793bc8a14a2561417f71bc2778e7d44e8d43695425c1da5edb667a1f2c256a9e9fa4f983bc6fc35b52445fbfdb41354b0fcf173e2b960a186c8e6019418281417fc9d184e5720ea7dfba6b1851ab19fb8b8cc6628b1f06b7e64fac6f3cb37e465f8c645ead9ac77b38af388872bc4bbbf1bab183b7ff1dac11bd81ecfdcd7acd0c27daab43f59fc3c86ba843253acfebdf4438db4a62bfef083c737e49a52dde78dc2f7ba09cc6db701b49a11c6991c27d8f4631ee8dd954d1ececdb0092e0"], 0x1) r2 = syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000180)={0x400000000000002, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000080)={0x8, 0x0, 0x0, 0xc79}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 03:10:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:18 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 281.788693] ? trace_hardirqs_on+0x10/0x10 [ 281.792948] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.798070] ? find_held_lock+0x36/0x1c0 [ 281.802155] ? find_held_lock+0x36/0x1c0 [ 281.806249] ? check_same_owner+0x340/0x340 [ 281.810590] ? rcu_note_context_switch+0x730/0x730 [ 281.815535] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 281.820568] __should_failslab+0x124/0x180 [ 281.824816] should_failslab+0x9/0x14 [ 281.828659] kmem_cache_alloc+0x2af/0x760 [ 281.832846] __d_alloc+0xc8/0xd50 [ 281.836307] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 281.841336] ? do_raw_spin_unlock+0xa7/0x2f0 [ 281.845759] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 281.850359] ? __lock_is_held+0xb5/0x140 [ 281.854442] ? _raw_spin_unlock+0x22/0x30 [ 281.858601] ? __alloc_fd+0x34e/0x710 [ 281.862421] ? exit_files+0xb0/0xb0 [ 281.866068] d_alloc_pseudo+0x1d/0x30 [ 281.869888] __shmem_file_setup+0x1f3/0x700 [ 281.874290] ? check_same_owner+0x340/0x340 [ 281.878693] ? shmem_fill_super+0xa50/0xa50 [ 281.883052] ? get_unused_fd_flags+0x122/0x1a0 [ 281.887652] ? __alloc_fd+0x710/0x710 [ 281.891464] shmem_file_setup+0x2f/0x40 [ 281.895457] __x64_sys_memfd_create+0x2af/0x4f0 [ 281.900135] ? memfd_fcntl+0x1400/0x1400 [ 281.904211] ? do_syscall_64+0x9a/0x820 [ 281.908213] do_syscall_64+0x1b9/0x820 [ 281.912115] ? finish_task_switch+0x1d3/0x870 [ 281.916610] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.921532] ? syscall_return_slowpath+0x31d/0x5e0 [ 281.926489] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 281.931863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.936719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.941923] RIP: 0033:0x455e29 [ 281.945114] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.964340] RSP: 002b:00007f53b7997a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 281.972041] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 281.979299] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 03:10:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 281.986553] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 281.993820] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 282.001077] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000001 [ 282.011808] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 282.019175] BTRFS error (device loop6): superblock checksum mismatch 03:10:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:18 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:18 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:18 executing program 7: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x401, 0x80000) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000140)) r2 = socket$inet(0x2, 0x3, 0x2) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x200000, 0x0) ioctl$KDENABIO(r3, 0x4b36) getsockopt$inet_int(r2, 0x0, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0xf9, "c9677daf562073511579530d25836ab1ade38d3e80c8f9e959d32a9c504d6de79ea24969332d64f186b6dfd1919581dfecabe24313ee75bf8c1b124d82e429dc69595e26c90ad8fdda77f9d5526806ec54587b2ced1e45989ae14a3995c6b2fa131c7d249a3b2fab08026c85503b01ca2e61466151f25e82d2cd9d391d6ba0174fc4d6f6f3fce0087f1a3eec111761d834c400403533f3b884ae98c57c4205f64f662e8efe33383400adbdf35e858f13cf8d5c2c3c5673d2cb24db337f05ec2f12e2524aadb76cdb6b641678a3e2983e25493ef41786a918441aa77597a77e8a2cb585613cad023fbc088f458f2e8f8208d9276a5a7e3d35f8"}, &(0x7f00000002c0)=0x101) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000300)={0x7fff, 0x10001, 0x1, 0xe3, 0xffffffffffff35b0, 0x9, 0x65, 0x100000001, r4}, 0x20) setsockopt$inet_int(r2, 0x0, 0xcd, &(0x7f0000000000), 0x3c) [ 282.208239] BTRFS error (device loop6): open_ctree failed 03:10:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 282.266170] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 282.273502] BTRFS error (device loop6): superblock checksum mismatch [ 282.288402] FAULT_INJECTION: forcing a failure. [ 282.288402] name failslab, interval 1, probability 0, space 0, times 0 [ 282.299798] CPU: 0 PID: 14214 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #142 [ 282.307173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.316543] Call Trace: [ 282.318870] BTRFS error (device loop6): open_ctree failed [ 282.319153] dump_stack+0x1c9/0x2b4 [ 282.319175] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.333522] ? __kernel_text_address+0xd/0x40 [ 282.338034] should_fail.cold.4+0xa/0x1a [ 282.342111] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.347232] ? save_stack+0xa9/0xd0 [ 282.350863] ? save_stack+0x43/0xd0 [ 282.354479] ? kasan_kmalloc+0xc4/0xe0 [ 282.358350] ? kasan_slab_alloc+0x12/0x20 [ 282.362482] ? kmem_cache_alloc+0x12e/0x760 [ 282.366788] ? __d_alloc+0xc8/0xd50 [ 282.370405] ? d_alloc_pseudo+0x1d/0x30 [ 282.374416] ? __shmem_file_setup+0x1f3/0x700 [ 282.378898] ? shmem_file_setup+0x2f/0x40 [ 282.383042] ? find_held_lock+0x36/0x1c0 [ 282.387126] ? check_same_owner+0x340/0x340 [ 282.391450] ? rcu_note_context_switch+0x730/0x730 [ 282.396366] ? kasan_check_read+0x11/0x20 [ 282.400506] __should_failslab+0x124/0x180 [ 282.404734] should_failslab+0x9/0x14 [ 282.408524] kmem_cache_alloc+0x2af/0x760 [ 282.412666] ? rcu_read_lock_sched_held+0x108/0x120 [ 282.417667] ? kmem_cache_alloc+0x5fa/0x760 [ 282.421975] ? shmem_destroy_callback+0xc0/0xc0 [ 282.426644] shmem_alloc_inode+0x1b/0x40 [ 282.430705] alloc_inode+0x63/0x190 [ 282.434322] new_inode_pseudo+0x71/0x1a0 [ 282.438369] ? prune_icache_sb+0x1b0/0x1b0 [ 282.442602] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 282.447607] new_inode+0x1c/0x40 [ 282.450964] shmem_get_inode+0xf1/0x910 [ 282.454928] ? shmem_encode_fh+0x340/0x340 [ 282.459163] ? _raw_spin_unlock+0x22/0x30 [ 282.463297] ? __alloc_fd+0x34e/0x710 [ 282.467085] ? exit_files+0xb0/0xb0 [ 282.470702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.476241] __shmem_file_setup+0x259/0x700 [ 282.480561] ? check_same_owner+0x340/0x340 [ 282.484871] ? shmem_fill_super+0xa50/0xa50 [ 282.489191] ? get_unused_fd_flags+0x122/0x1a0 [ 282.493767] ? __alloc_fd+0x710/0x710 [ 282.497569] shmem_file_setup+0x2f/0x40 [ 282.501536] __x64_sys_memfd_create+0x2af/0x4f0 [ 282.506194] ? memfd_fcntl+0x1400/0x1400 [ 282.510254] ? do_syscall_64+0x9a/0x820 [ 282.514220] do_syscall_64+0x1b9/0x820 [ 282.518113] ? finish_task_switch+0x1d3/0x870 [ 282.522609] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.527527] ? syscall_return_slowpath+0x31d/0x5e0 [ 282.532458] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 282.537815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.543470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.548648] RIP: 0033:0x455e29 03:10:19 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 282.551820] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.571247] RSP: 002b:00007f53b7997a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 282.578954] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 282.586212] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 282.593465] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 282.600720] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 282.607991] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000002 03:10:19 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 282.618328] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 282.625609] BTRFS error (device loop6): superblock checksum mismatch 03:10:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:19 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001840)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(generic-gcm-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="b956d2e54f67b49d06a09dc2eb391e197cc695", 0x13) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)="2ef99f8baf76f54e8b1c8677f925731e", 0x10}], 0x1, &(0x7f0000000200)}, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000018c0)=""/4096, 0x1000}}, {{&(0x7f0000001580)=@sco, 0x80, &(0x7f0000001700)=[{&(0x7f0000001680)=""/91, 0x5b}], 0x1, &(0x7f0000001740)=""/150, 0x96}}], 0x2, 0x0, &(0x7f0000001800)={0x77359400}) 03:10:19 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 282.739152] BTRFS error (device loop6): open_ctree failed 03:10:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 282.869238] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 282.876575] BTRFS error (device loop1): superblock checksum mismatch [ 282.924782] BTRFS error (device loop1): open_ctree failed [ 282.940208] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 282.947482] BTRFS error (device loop1): superblock checksum mismatch [ 282.972297] BTRFS error (device loop1): open_ctree failed [ 283.005337] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 283.012588] BTRFS error (device loop1): superblock checksum mismatch 03:10:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f5", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:19 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:19 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = gettid() syz_open_procfs(r1, &(0x7f0000000080)='net/sockstat\x00') r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = eventfd(0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000000)) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000015c0)={r3}) write$eventfd(r3, &(0x7f0000000040), 0x8) 03:10:19 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='/trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 283.056218] BTRFS error (device loop1): open_ctree failed [ 283.071488] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 283.078718] BTRFS error (device loop1): superblock checksum mismatch [ 283.132169] BTRFS error (device loop1): open_ctree failed [ 283.148753] FAULT_INJECTION: forcing a failure. [ 283.148753] name failslab, interval 1, probability 0, space 0, times 0 [ 283.160098] CPU: 1 PID: 14282 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #142 [ 283.167473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.176836] Call Trace: 03:10:19 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 283.179448] dump_stack+0x1c9/0x2b4 [ 283.183090] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.188292] ? __lock_acquire+0x7fc/0x5020 [ 283.192550] should_fail.cold.4+0xa/0x1a [ 283.196633] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.201749] ? find_held_lock+0x36/0x1c0 [ 283.205817] ? graph_lock+0x170/0x170 [ 283.209635] ? find_held_lock+0x36/0x1c0 [ 283.213728] ? check_same_owner+0x340/0x340 [ 283.218061] ? graph_lock+0x170/0x170 [ 283.221888] ? rcu_note_context_switch+0x730/0x730 [ 283.226828] ? kasan_check_read+0x11/0x20 03:10:19 executing program 4: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 283.230987] __should_failslab+0x124/0x180 [ 283.235261] should_failslab+0x9/0x14 [ 283.239074] kmem_cache_alloc+0x2af/0x760 [ 283.243231] ? find_held_lock+0x36/0x1c0 [ 283.247354] get_empty_filp+0x12d/0x530 [ 283.251353] ? proc_nr_files+0x60/0x60 [ 283.255262] ? kasan_check_read+0x11/0x20 [ 283.259424] ? do_raw_spin_unlock+0xa7/0x2f0 [ 283.263934] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 283.268558] ? kasan_check_write+0x14/0x20 [ 283.272803] ? do_raw_spin_lock+0xc1/0x200 [ 283.277056] alloc_file+0x24/0x3e0 03:10:20 executing program 4: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 283.280612] ? clear_nlink.part.9+0x65/0x80 [ 283.284950] __shmem_file_setup+0x313/0x700 [ 283.289284] ? check_same_owner+0x340/0x340 [ 283.293653] ? shmem_fill_super+0xa50/0xa50 [ 283.297997] ? get_unused_fd_flags+0x122/0x1a0 [ 283.302594] ? __alloc_fd+0x710/0x710 [ 283.306417] shmem_file_setup+0x2f/0x40 [ 283.310410] __x64_sys_memfd_create+0x2af/0x4f0 [ 283.315091] ? memfd_fcntl+0x1400/0x1400 [ 283.319195] ? do_syscall_64+0x9a/0x820 [ 283.323183] do_syscall_64+0x1b9/0x820 [ 283.327100] ? finish_task_switch+0x1d3/0x870 [ 283.331611] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.336551] ? syscall_return_slowpath+0x31d/0x5e0 [ 283.341520] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 283.346900] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.351763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.356961] RIP: 0033:0x455e29 [ 283.360152] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:10:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:20 executing program 4: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 283.379517] RSP: 002b:00007f53b7997a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 283.387233] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000455e29 [ 283.394500] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004baa70 [ 283.401766] RBP: 000000000072bea0 R08: 0000000020000218 R09: 00000000fbad8001 [ 283.409025] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 283.416282] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000003 03:10:20 executing program 7: r0 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000080)={0xfffffffffffff331, 0x9, 0xfffffffffffff46f, 0x973}, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001d00)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000001cc0)={&(0x7f00000017c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="0128000000000000000003000000"], 0x14}, 0x1}, 0x0) 03:10:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='\ntrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:20 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:20 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:20 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='%trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000600)=ANY=[]) r1 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x0) fcntl$setlease(r1, 0x400, 0x1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) faccessat(r2, &(0x7f0000000000)='./file0/file0\x00', 0x2, 0x800) rename(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='./file0/file0\x00') [ 283.811811] FAULT_INJECTION: forcing a failure. [ 283.811811] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 283.823766] CPU: 1 PID: 14355 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #142 [ 283.831137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.840502] Call Trace: [ 283.843110] dump_stack+0x1c9/0x2b4 [ 283.846759] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.851963] ? __radix_tree_lookup+0x3dd/0x6e0 [ 283.856574] should_fail.cold.4+0xa/0x1a [ 283.860667] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.865799] ? graph_lock+0x170/0x170 [ 283.869622] ? find_held_lock+0x36/0x1c0 [ 283.873714] ? find_held_lock+0x36/0x1c0 [ 283.877834] ? __lock_is_held+0xb5/0x140 [ 283.881932] ? check_same_owner+0x340/0x340 [ 283.886284] ? rcu_note_context_switch+0x730/0x730 [ 283.891260] __alloc_pages_nodemask+0x36e/0xdb0 [ 283.895964] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 283.901031] ? trace_hardirqs_on+0x10/0x10 [ 283.905305] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 283.910365] ? percpu_counter_add_batch+0xf2/0x150 [ 283.915332] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 283.920455] ? __vm_enough_memory+0x590/0x980 [ 283.924976] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 283.930533] alloc_pages_vma+0xdd/0x540 [ 283.934718] shmem_alloc_page+0xa8/0x190 [ 283.938792] ? shmem_swapin+0x230/0x230 [ 283.942774] ? print_usage_bug+0xc0/0xc0 [ 283.946897] shmem_alloc_and_acct_page+0x1f1/0x820 [ 283.951843] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 283.956534] shmem_getpage_gfp+0x6ea/0x41e0 03:10:20 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 283.960169] FAT-fs (loop7): bogus number of reserved sectors [ 283.960876] ? print_usage_bug+0xc0/0xc0 [ 283.960899] ? shmem_writepage+0x1380/0x1380 [ 283.966723] FAT-fs (loop7): Can't find a valid FAT filesystem [ 283.970748] ? print_usage_bug+0xc0/0xc0 [ 283.970767] ? __lock_acquire+0x7fc/0x5020 [ 283.970788] ? print_usage_bug+0xc0/0xc0 [ 283.993405] ? __lock_acquire+0x7fc/0x5020 [ 283.997662] ? print_usage_bug+0xc0/0xc0 [ 284.001744] ? __lock_acquire+0x7fc/0x5020 [ 284.005993] ? __lock_acquire+0x7fc/0x5020 [ 284.010242] ? check_noncircular+0x20/0x20 [ 284.014491] ? __lock_acquire+0x7fc/0x5020 [ 284.018782] ? __lock_acquire+0x7fc/0x5020 [ 284.023053] ? trace_hardirqs_on+0x10/0x10 [ 284.027307] ? print_usage_bug+0xc0/0xc0 [ 284.031386] ? __lock_acquire+0x7fc/0x5020 [ 284.035648] ? print_usage_bug+0xc0/0xc0 [ 284.039737] ? print_usage_bug+0xc0/0xc0 [ 284.043821] ? graph_lock+0x170/0x170 [ 284.047644] ? print_usage_bug+0xc0/0xc0 [ 284.051727] ? __lock_acquire+0x7fc/0x5020 [ 284.055991] ? __lock_acquire+0x7fc/0x5020 03:10:20 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 284.060256] ? graph_lock+0x170/0x170 [ 284.064083] ? find_held_lock+0x36/0x1c0 [ 284.068165] ? print_usage_bug+0xc0/0xc0 [ 284.072249] ? lock_downgrade+0x8f0/0x8f0 [ 284.076410] ? kasan_check_read+0x11/0x20 [ 284.080568] ? lock_release+0xa30/0xa30 [ 284.084554] ? mark_held_locks+0xc9/0x160 [ 284.088717] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.094267] ? iov_iter_fault_in_readable+0x23d/0x460 [ 284.099476] ? copy_page_from_iter+0x890/0x890 [ 284.104071] ? __sanitizer_cov_trace_const_cmp1+0x1d/0x20 03:10:20 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 284.109629] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 284.114841] shmem_write_begin+0x110/0x1e0 [ 284.119099] generic_perform_write+0x3ae/0x6c0 [ 284.123704] ? add_page_wait_queue+0x2c0/0x2c0 [ 284.128298] ? file_update_time+0xe4/0x640 [ 284.132540] ? current_time+0x1b0/0x1b0 [ 284.136529] ? down_write+0x8f/0x130 [ 284.140249] __generic_file_write_iter+0x26e/0x630 [ 284.145193] generic_file_write_iter+0x438/0x870 [ 284.149958] ? __generic_file_write_iter+0x630/0x630 [ 284.155072] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.160617] ? iov_iter_init+0xc9/0x1f0 [ 284.164607] __vfs_write+0x6c6/0x9f0 [ 284.168333] ? kernel_read+0x120/0x120 [ 284.172234] ? __lock_is_held+0xb5/0x140 [ 284.176323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.181869] ? __sb_start_write+0x17f/0x300 [ 284.186199] vfs_write+0x1f8/0x560 [ 284.189751] ksys_pwrite64+0x181/0x1b0 [ 284.193648] ? __ia32_sys_pread64+0xf0/0xf0 [ 284.197978] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 284.203517] ? fput+0x130/0x1a0 [ 284.206808] ? do_sys_ftruncate+0x44e/0x560 03:10:20 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 284.211135] __x64_sys_pwrite64+0x97/0xf0 [ 284.215291] do_syscall_64+0x1b9/0x820 [ 284.219182] ? finish_task_switch+0x1d3/0x870 [ 284.223685] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.228623] ? syscall_return_slowpath+0x31d/0x5e0 [ 284.233572] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 284.238943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.243800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.249011] RIP: 0033:0x4100e7 03:10:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:21 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 284.252196] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 284.271530] RSP: 002b:00007f53b7997a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 284.279244] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004100e7 [ 284.286524] RDX: 0000000000000048 RSI: 0000000020000500 RDI: 0000000000000014 [ 284.293820] RBP: 0000000000000000 R08: 0000000020000218 R09: 00000000fbad8001 [ 284.301118] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 284.308391] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000004 [ 284.424097] FAT-fs (loop7): bogus number of reserved sectors [ 284.430072] FAT-fs (loop7): Can't find a valid FAT filesystem 03:10:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='.trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 284.465502] print_req_error: I/O error, dev loop0, sector 128 [ 284.499817] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 284.507083] BTRFS error (device loop1): superblock checksum mismatch [ 284.597622] BTRFS error (device loop1): open_ctree failed [ 284.680613] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 284.687901] BTRFS error (device loop1): superblock checksum mismatch 03:10:21 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:21 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:21 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='b\nrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:21 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 284.762756] BTRFS error (device loop1): open_ctree failed [ 284.835010] FAULT_INJECTION: forcing a failure. [ 284.835010] name failslab, interval 1, probability 0, space 0, times 0 [ 284.846275] CPU: 0 PID: 14453 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #142 [ 284.853649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.863017] Call Trace: [ 284.865631] dump_stack+0x1c9/0x2b4 [ 284.869282] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.874505] should_fail.cold.4+0xa/0x1a [ 284.878585] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.883717] ? __lock_acquire+0x7fc/0x5020 [ 284.887971] ? print_usage_bug+0xc0/0xc0 [ 284.892054] ? print_usage_bug+0xc0/0xc0 [ 284.896122] ? trace_hardirqs_on+0x10/0x10 [ 284.900366] ? lock_downgrade+0x8f0/0x8f0 [ 284.904531] ? __lock_acquire+0x7fc/0x5020 [ 284.908771] ? print_usage_bug+0xc0/0xc0 [ 284.912829] __should_failslab+0x124/0x180 [ 284.917087] should_failslab+0x9/0x14 [ 284.920888] kmem_cache_alloc+0x47/0x760 [ 284.924951] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 284.930836] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 284.936536] __radix_tree_create+0x4d6/0x840 [ 284.940946] ? radix_tree_maybe_preload_order+0x110/0x110 [ 284.946483] ? find_held_lock+0x36/0x1c0 [ 284.950533] ? graph_lock+0x170/0x170 [ 284.954320] ? __lock_is_held+0xb5/0x140 [ 284.958370] ? print_usage_bug+0xc0/0xc0 [ 284.962439] ? find_held_lock+0x36/0x1c0 [ 284.966502] __radix_tree_insert+0x107/0x8f0 [ 284.970912] ? graph_lock+0x170/0x170 [ 284.974700] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 284.979731] ? __radix_tree_create+0x840/0x840 [ 284.984319] ? lock_acquire+0x1e4/0x540 [ 284.988284] ? shmem_add_to_page_cache+0x49c/0xe00 [ 284.993202] ? lock_release+0xa30/0xa30 [ 284.997183] ? kasan_check_write+0x14/0x20 [ 285.001405] ? do_raw_spin_lock+0xc1/0x200 [ 285.005727] shmem_add_to_page_cache+0x988/0xe00 [ 285.010474] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 285.014873] ? shmem_put_link+0x280/0x280 [ 285.019035] ? percpu_ref_put_many+0x131/0x240 [ 285.023606] ? percpu_ref_tryget+0x2d0/0x2d0 [ 285.028010] ? mem_cgroup_try_charge+0x548/0xa70 [ 285.032760] ? mem_cgroup_protected+0xa60/0xa60 [ 285.037420] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.042956] ? shmem_alloc_and_acct_page+0x31a/0x820 [ 285.048064] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 285.052727] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 285.057758] ? __radix_tree_preload+0x173/0x1d0 [ 285.062430] shmem_getpage_gfp+0x81b/0x41e0 [ 285.066847] ? shmem_writepage+0x1380/0x1380 [ 285.071256] ? print_usage_bug+0xc0/0xc0 [ 285.075308] ? __lock_acquire+0x7fc/0x5020 [ 285.079531] ? print_usage_bug+0xc0/0xc0 [ 285.083590] ? __lock_acquire+0x7fc/0x5020 [ 285.087814] ? print_usage_bug+0xc0/0xc0 [ 285.091862] ? __lock_acquire+0x7fc/0x5020 [ 285.096092] ? __lock_acquire+0x7fc/0x5020 [ 285.100316] ? check_noncircular+0x20/0x20 [ 285.104539] ? __lock_acquire+0x7fc/0x5020 [ 285.108762] ? __lock_acquire+0x7fc/0x5020 [ 285.112991] ? trace_hardirqs_on+0x10/0x10 [ 285.117215] ? print_usage_bug+0xc0/0xc0 [ 285.121263] ? __lock_acquire+0x7fc/0x5020 [ 285.125499] ? print_usage_bug+0xc0/0xc0 [ 285.129559] ? print_usage_bug+0xc0/0xc0 [ 285.133662] ? graph_lock+0x170/0x170 [ 285.137453] ? print_usage_bug+0xc0/0xc0 [ 285.141502] ? __lock_acquire+0x7fc/0x5020 [ 285.145730] ? __lock_acquire+0x7fc/0x5020 [ 285.149955] ? graph_lock+0x170/0x170 [ 285.153748] ? find_held_lock+0x36/0x1c0 [ 285.157801] ? print_usage_bug+0xc0/0xc0 [ 285.161872] ? lock_downgrade+0x8f0/0x8f0 [ 285.166015] ? kasan_check_read+0x11/0x20 [ 285.170157] ? lock_release+0xa30/0xa30 [ 285.174131] ? mark_held_locks+0xc9/0x160 [ 285.178273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.183814] ? iov_iter_fault_in_readable+0x23d/0x460 [ 285.189006] ? copy_page_from_iter+0x890/0x890 [ 285.193596] ? __sanitizer_cov_trace_const_cmp1+0x1d/0x20 [ 285.199123] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 285.204304] shmem_write_begin+0x110/0x1e0 [ 285.208547] generic_perform_write+0x3ae/0x6c0 [ 285.213129] ? add_page_wait_queue+0x2c0/0x2c0 [ 285.217754] ? file_update_time+0xe4/0x640 [ 285.221979] ? current_time+0x1b0/0x1b0 [ 285.225962] ? down_write+0x8f/0x130 [ 285.229667] __generic_file_write_iter+0x26e/0x630 [ 285.234601] generic_file_write_iter+0x438/0x870 [ 285.239357] ? __generic_file_write_iter+0x630/0x630 [ 285.244463] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.249988] ? iov_iter_init+0xc9/0x1f0 [ 285.253952] __vfs_write+0x6c6/0x9f0 [ 285.257654] ? kernel_read+0x120/0x120 [ 285.261537] ? __lock_is_held+0xb5/0x140 [ 285.265597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.271123] ? __sb_start_write+0x17f/0x300 [ 285.275433] vfs_write+0x1f8/0x560 [ 285.278976] ksys_pwrite64+0x181/0x1b0 [ 285.282865] ? __ia32_sys_pread64+0xf0/0xf0 [ 285.287177] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 285.292708] ? fput+0x130/0x1a0 [ 285.295993] ? do_sys_ftruncate+0x44e/0x560 [ 285.300309] __x64_sys_pwrite64+0x97/0xf0 [ 285.304471] do_syscall_64+0x1b9/0x820 [ 285.308346] ? finish_task_switch+0x1d3/0x870 [ 285.312832] ? syscall_return_slowpath+0x5e0/0x5e0 [ 285.317755] ? syscall_return_slowpath+0x31d/0x5e0 [ 285.322697] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 285.328067] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.332917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.338105] RIP: 0033:0x4100e7 [ 285.341277] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 285.360508] RSP: 002b:00007f53b7997a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 285.368208] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004100e7 [ 285.375465] RDX: 0000000000000048 RSI: 0000000020000500 RDI: 0000000000000014 03:10:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:22 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 285.382724] RBP: 0000000000000000 R08: 0000000020000218 R09: 00000000fbad8001 [ 285.389993] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 285.397256] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000005 [ 285.445614] print_req_error: I/O error, dev loop2, sector 128 [ 285.463301] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 285.470606] BTRFS error (device loop1): superblock checksum mismatch [ 285.533188] BTRFS error (device loop1): open_ctree failed 03:10:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='b%rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 285.574328] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 285.581632] BTRFS error (device loop1): superblock checksum mismatch 03:10:22 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 285.676310] BTRFS error (device loop1): open_ctree failed [ 285.714615] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 285.721924] BTRFS error (device loop1): superblock checksum mismatch 03:10:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='b/rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:22 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 285.799638] BTRFS error (device loop1): open_ctree failed [ 285.809589] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 285.816832] BTRFS error (device loop1): superblock checksum mismatch [ 285.899313] BTRFS error (device loop1): open_ctree failed [ 285.923344] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 285.930619] BTRFS error (device loop1): superblock checksum mismatch 03:10:22 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f6", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:22 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="627402667300", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:22 executing program 7: socketpair(0x0, 0x80000, 0xa33, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x40, 0x80) r3 = getpid() ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000080)=r3) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f0000000180)) r4 = getpid() setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000100)=0x6, 0x4) ptrace(0xffffffffffffffff, r3) sched_setaffinity(r4, 0x8, &(0x7f0000000000)) gettid() 03:10:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 285.966401] BTRFS error (device loop1): open_ctree failed [ 285.987975] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 285.995242] BTRFS error (device loop1): superblock checksum mismatch [ 286.043445] BTRFS error (device loop1): open_ctree failed 03:10:22 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:22 executing program 7: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000500)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001dd08804a0000000000000001acb31872b08532700000000da382a7fc6fe43e53b1cf928b3f27feb91"], 0x14}, 0x1}, 0x0) 03:10:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='bt/fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:23 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:23 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 286.359326] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 286.366578] BTRFS error (device loop3): superblock checksum mismatch 03:10:23 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0xb1, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0xa, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r2, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x50000, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000340)=0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r2, &(0x7f0000000000), &(0x7f0000000140)=""/129}, 0x18) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f00000000c0), &(0x7f0000000300)) syncfs(r2) getsockopt$inet6_buf(r4, 0x29, 0xcf, &(0x7f0000000200)=""/209, &(0x7f0000000080)=0xd1) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x90200, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000040)={0x10, 0x4}) dup2(r1, r2) [ 286.464394] BTRFS error (device loop3): open_ctree failed 03:10:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='bt\nfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 286.520548] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 286.527853] BTRFS error (device loop1): superblock checksum mismatch 03:10:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:23 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 286.627011] BTRFS error (device loop1): open_ctree failed 03:10:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='bt%fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 286.670522] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 286.677789] BTRFS error (device loop1): superblock checksum mismatch 03:10:23 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:23 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000040)=""/19) rt_sigtimedwait(&(0x7f00005a1000), &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) r2 = msgget(0x1, 0x8) msgctl$MSG_INFO(r2, 0xc, &(0x7f00000002c0)=""/219) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='task\x00') getdents(r3, &(0x7f0000000080)=""/103, 0x67) sendfile(r3, r1, &(0x7f0000000200), 0xff) r4 = geteuid() setfsuid(r4) getdents(r3, &(0x7f0000000100)=""/181, 0x20) 03:10:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 286.799927] BTRFS error (device loop1): open_ctree failed 03:10:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 286.914620] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 286.921880] BTRFS error (device loop1): superblock checksum mismatch 03:10:23 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btr%s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 287.069197] BTRFS error (device loop1): open_ctree failed 03:10:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 287.132508] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 287.139847] BTRFS error (device loop1): superblock checksum mismatch 03:10:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:23 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:23 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 287.231960] BTRFS error (device loop1): open_ctree failed 03:10:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 287.327169] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 287.334540] BTRFS error (device loop1): superblock checksum mismatch 03:10:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:24 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 287.451287] BTRFS error (device loop1): open_ctree failed [ 287.474061] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 287.481308] BTRFS error (device loop1): superblock checksum mismatch [ 287.583923] BTRFS error (device loop1): open_ctree failed [ 287.635063] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 287.642334] BTRFS error (device loop6): superblock checksum mismatch [ 287.649749] BTRFS error (device loop6): open_ctree failed 03:10:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000000080)=@pptp={0x1a2, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000180)="35fde5eb508b58fbc244267050ece037a117b10e7aec0c8e315f162a3c8c5bb352d204176c405081c3743e385e", 0x2d}, {&(0x7f00000001c0)="b18c0ad068b353df573e2cb367db15903311a9d729afc37440523045a6e73fe867231be29af437c304d4ee4dc12ef017e4fff86b3527c8aaa6799b3b00c269c7c1adc43bcfa1349105f3166a8b5a", 0x4e}, {&(0x7f0000000240)="56f6dcb27c5bbda197b6db209b28a8fa7710c32e6f80be75cf96fdee19e8db8b6ddf17ebd9ef2562a9a2889a323dc1c3d6767e26", 0x34}, {&(0x7f00000002c0)="b94e6bc7985f0c692796e0a70e2194cff690917f2b5d659b087d64c6c98931aae85436341317d4edd869fe3e7338b130f3c9790c7fe7fe96c630d09ad57bef9a46bb87cffd5c0f418a9a2db31a6629f2ebda924951eee6303f88fff6f1583b8d2a6abf76b833f37fd8b185a92bb00a6b8586b64ef3eb1f391d1ad85e7db6dec5a8", 0x81}, {&(0x7f0000000380)="6ba12a1325f9d931c31541f1ef2f9e80b4c0970a3a88304e2cebe202a976c1b7268d4c3ece9a326753b552c9b03302f48c00f6a0e8e1952cf5b8df1c73d9fec2b775a2a07ca9d0f55e9773a17fe6916c6fad3913402230c7b57ba9ddb276c693e7463bb66b4cb16de51310e8a857dddebb1b7fdcf110d3f493841024018dc5d57a48ccc6c40624b30d634cb2c0b8c635c306df28e9ee38232b6eccd896c8eb8078fc3989997ea40864e6ee782df9b92f6b796f12fae2fd937ff891cd2528252be4637ad47cc14adfc61daca4319a594778784d", 0xd3}, {&(0x7f0000000480)="11f81eff47e931311b9d4de4ed5c7053e7f2511d96fe1c981c59a1a31e9b400628fa5775544b1015c2a43ddd3250b257f306aac18ef7d6b93e11619eb6d0d2469366a8b10dbce3b28e", 0x49}, {&(0x7f0000000500)}, {&(0x7f0000000540)="36fe4115b5664b12", 0x8}, {&(0x7f0000000580)="8e017183fb4cfe9d2bafd2d37f04c3cdb6bdc23453a22b322d4495e8fef9cf4c5cc35bc136f6ae0078cb5b5c002eff26f45f3e", 0x33}, {&(0x7f00000005c0)="22151428d05642718da559a026b719c32dec23f654b3d589c8ad05206b5cb2cc08dcadcc09f4d3ecffba37ecab333f71b6498f2f8bc8d2784933eee752bdba4c2e9239ab1e452e00deea28963860a25b9898623193f6b4cb93566e37a3c94f2d599257ee854fdcab6bd181f388d2c8b37e95b8963f98c15eed1d2e5d7f0521dfd785b603dff29f2d21dbb828c1ac1d784152f779d04cb81a", 0x98}], 0xa, &(0x7f0000003bc0)}}], 0x1, 0x0) 03:10:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf\n\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:24 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:24 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="627472667306", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:24 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btr\ns\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f6", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:24 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 288.423693] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 288.431087] BTRFS error (device loop6): superblock checksum mismatch 03:10:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x8000000000000806, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x5}, 0x1c) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000200), &(0x7f00000001c0)=0x4) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x638b}, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40001, 0x5) getdents(r2, &(0x7f00000000c0)=""/128, 0x80) close(r1) 03:10:25 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673c0", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 288.465962] BTRFS error (device loop6): open_ctree failed 03:10:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 288.629174] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 288.636445] BTRFS error (device loop1): superblock checksum mismatch 03:10:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:25 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="000100000008000081000000c9035d7cf4000204000000000000000000000000000000000020000000010000000000016e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="001e832e548f4ecf62dddda6106c9cbd29bc078a8541d25cdbe5fa7cfec6158184ec9135aaa9bb9d9e5dcbdc925d392360e8b3c2a9c58f008127"]) [ 288.768081] BTRFS error (device loop1): open_ctree failed 03:10:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:25 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 288.899340] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 03:10:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:25 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 288.953475] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 289.023097] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 289.030353] BTRFS error (device loop3): superblock checksum mismatch 03:10:25 executing program 7: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0xfffffffffffffffd, 0xffff, 0x0, 0x9}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x4000000000000002) r4 = dup3(r3, r1, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000580)}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x111, 0x4}}, 0x20) ioctl$TCXONC(r3, 0x540a, 0x1) [ 289.100382] BTRFS error (device loop3): open_ctree failed [ 289.111694] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 289.119145] BTRFS error (device loop3): superblock checksum mismatch 03:10:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:26 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 289.258716] BTRFS error (device loop3): open_ctree failed 03:10:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf\n\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 289.340933] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 289.348189] BTRFS error (device loop3): superblock checksum mismatch 03:10:26 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 289.409377] BTRFS error (device loop3): open_ctree failed [ 289.432947] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 289.440298] BTRFS error (device loop3): superblock checksum mismatch 03:10:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 289.580566] BTRFS error (device loop3): open_ctree failed [ 289.657522] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 289.664809] BTRFS error (device loop3): superblock checksum mismatch 03:10:26 executing program 4 (fault-call:6 fault-nth:0): r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 289.733639] BTRFS error (device loop3): open_ctree failed 03:10:26 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="627472667302", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 289.920535] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 289.927930] BTRFS error (device loop6): superblock checksum mismatch [ 289.945876] BTRFS error (device loop6): open_ctree failed [ 290.044578] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 290.051927] BTRFS error (device loop6): superblock checksum mismatch 03:10:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) connect$can_bcm(r1, &(0x7f0000000700)={0x1d}, 0x52) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000140)={0x6, 0x94d, 0x9, 0x5, 0x101, 0x10001, 0x8}) sendmsg$can_raw(r1, &(0x7f0000001fc8)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x1}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}, 0x1}, 0x0) 03:10:26 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:26 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 290.115358] BTRFS error (device loop6): open_ctree failed [ 290.252574] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 290.259927] BTRFS error (device loop1): superblock checksum mismatch 03:10:27 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2500000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:27 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:27 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@ipv6_newrule={0x34, 0x20, 0x1, 0x0, 0x0, {0x2, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_DST={0x14, 0x1}]}, 0x34}, 0x1}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x82) accept4$nfc_llcp(r1, 0x0, &(0x7f0000000080), 0x80000) 03:10:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 290.413274] BTRFS error (device loop1): open_ctree failed 03:10:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 290.474294] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 290.481576] BTRFS error (device loop1): superblock checksum mismatch 03:10:27 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x3100000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 290.575480] BTRFS error (device loop1): open_ctree failed 03:10:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f760070") clone(0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000580)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) setpriority(0x1, 0x0, 0x0) [ 290.617455] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 290.624707] BTRFS error (device loop1): superblock checksum mismatch 03:10:27 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:27 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0xf000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 290.807402] BTRFS error (device loop1): open_ctree failed [ 290.939900] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 290.947279] BTRFS error (device loop1): superblock checksum mismatch 03:10:27 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 291.040407] BTRFS error (device loop1): open_ctree failed [ 291.064812] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 291.072094] BTRFS error (device loop1): superblock checksum mismatch 03:10:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:27 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x11, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:27 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001}, 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x8adae499d2b6c7b5, r1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x9bc, 0x20}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={r2, 0xded}, &(0x7f0000000100)=0x8) [ 291.147202] BTRFS error (device loop1): open_ctree failed [ 291.190684] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 291.197963] BTRFS error (device loop6): superblock checksum mismatch 03:10:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs`', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrlimit(0x10, &(0x7f00000001c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="18bfffffff7110b000000000000000000000000000950000000000000069a1d6ed2817c5113fe303aeebe0e7aa7118b94263e3fcbf5b164e0817f3330127ddafe5876a9ca505117071efeb4b883ef8ffa383ef944b74ece7cda0ba73dc5dd4036c6c0d4cbc6fb020072e09a7b6a1ffae1d1fc3d841694ef7e4669a9c1105990d754bc314d2bfb1433a3ba06d1b3bddfee848d7b8b5b5ea338a822bcc513234ed12a47a5ec14d79f9076c517591107eee15167e9659050c170eaef6277c4d753b7013900f12f6"], &(0x7f0000000100)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x4}, 0x48) r2 = getpgid(0x0) fcntl$lock(r1, 0x7, &(0x7f00000000c0)={0x3, 0x3, 0x3, 0x8, r2}) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x4000) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r3, 0x81785501, &(0x7f0000000080)=""/27) rseq(&(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3, 0x1f, 0x0, 0x2}, 0xfffffffffffffffe}, 0x20, 0x3, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xb14f) memfd_create(&(0x7f0000000200)='/dev/vcsa#\x00', 0x3) 03:10:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:28 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2d, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 291.321515] BTRFS error (device loop6): open_ctree failed 03:10:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="627472667302", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 291.472381] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 291.479664] BTRFS error (device loop6): superblock checksum mismatch 03:10:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 291.582085] BTRFS error (device loop6): open_ctree failed 03:10:28 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000001000)=ANY=[@ANYRES32], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x82) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000082}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getqdisc={0x34, 0x26, 0x1, 0x70bd25, 0x25dfdbff, {0x0, r1, {0xffe2}, {0xf}, {0xffff, 0x2}}, [{0x4, 0xa}, {0x4, 0xa}, {0x4, 0xa}, {0x4, 0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) 03:10:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf/\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x30, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 291.682296] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 291.689548] BTRFS error (device loop6): superblock checksum mismatch 03:10:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x4b, &(0x7f0000000000)={@remote={0xfe, 0x80, [], 0xbb}}, 0x20) [ 291.751773] BTRFS error (device loop6): open_ctree failed 03:10:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 291.933192] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 291.940520] BTRFS error (device loop6): superblock checksum mismatch 03:10:28 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2100000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 7: r0 = socket(0x1, 0x5, 0x100002) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f000031c000)=""/137, &(0x7f0000000000)=0x89) 03:10:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 292.057777] BTRFS error (device loop6): open_ctree failed [ 292.120553] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 292.127848] BTRFS error (device loop6): superblock checksum mismatch 03:10:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 292.180179] BTRFS error (device loop6): open_ctree failed 03:10:28 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:28 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2500, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:29 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x6, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x1000000009, 0x2, 0x8180, 0x2b, r0, 0x5}, 0x11) [ 292.314876] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 292.322215] BTRFS error (device loop1): superblock checksum mismatch 03:10:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ac", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 292.477089] BTRFS error (device loop1): open_ctree failed [ 292.515284] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 292.522521] BTRFS error (device loop1): superblock checksum mismatch 03:10:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:29 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x1a01, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:29 executing program 7: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, &(0x7f0000000b80)) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='.\x00', &(0x7f0000000180)='reiserfs\x00', 0x2002, &(0x7f00000001c0)) [ 292.645383] BTRFS error (device loop1): open_ctree failed 03:10:29 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x8, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:29 executing program 5 (fault-call:6 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 292.734268] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 292.741582] BTRFS error (device loop3): superblock checksum mismatch [ 292.797790] 9pnet: Insufficient options for proto=fd 03:10:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 292.850906] 9pnet: Insufficient options for proto=fd 03:10:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 292.886931] BTRFS error (device loop3): open_ctree failed [ 292.940692] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 292.947951] BTRFS error (device loop3): superblock checksum mismatch [ 292.997413] BTRFS error (device loop3): open_ctree failed [ 293.038346] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 293.045667] BTRFS error (device loop3): superblock checksum mismatch 03:10:29 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x10, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:29 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f0000000600)={0x10}, 0xc, &(0x7f0000000680)={&(0x7f00000000c0)=@ipv6_newaddr={0x2c, 0x14, 0x1, 0x0, 0x0, {0xa, 0x81, 0x1, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @remote={0xfe, 0x80, [], 0xbb}}]}, 0x2c}, 0x1}, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100, 0x2000) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000c60000007a2de3decf1a237a496317e9ac09acf799baf48d7ccfe222adc50311672b6caf368b8dfd43b86e60bb1acfc00689f1a630df7ddd235a256bf575245dc5d98d7490fe84df1297fca92970005c8d89586544fde417759d166994fe099219fbe540454283a2c15c10139e3f5732e2a551ee7cc1655968737e8c6b4b734bf09da5b55a407dab7c716b06d7d966778ea5ac756b8257b9ffc004ecce3ef9742764e6957f9736937c91a551b2c717e6a5c8ec226fc244901d2fdfbc74bc66692dbe966e023ee5618de2"], &(0x7f0000000080)=0xea) 03:10:29 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 293.127898] BTRFS error (device loop3): open_ctree failed [ 293.164604] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 293.171879] BTRFS error (device loop3): superblock checksum mismatch 03:10:29 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:29 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2000000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 293.253359] BTRFS error (device loop3): open_ctree failed [ 293.276700] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 293.283983] BTRFS error (device loop3): superblock checksum mismatch 03:10:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 293.317454] BTRFS error (device loop3): open_ctree failed [ 293.328119] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 293.335365] BTRFS error (device loop3): superblock checksum mismatch [ 293.360188] BTRFS error (device loop3): open_ctree failed [ 293.384006] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 293.391326] BTRFS error (device loop6): superblock checksum mismatch 03:10:30 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:30 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x25000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 293.497872] BTRFS error (device loop6): open_ctree failed [ 293.541147] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 293.548451] BTRFS error (device loop6): superblock checksum mismatch [ 293.573760] BTRFS error (device loop6): open_ctree failed 03:10:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 293.592433] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 293.599841] BTRFS error (device loop6): superblock checksum mismatch 03:10:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="62747266731c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:30 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 293.678255] BTRFS error (device loop6): open_ctree failed 03:10:30 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0xc00, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 293.732007] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 293.739273] BTRFS error (device loop6): superblock checksum mismatch 03:10:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x2e, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 293.895319] BTRFS error (device loop6): open_ctree failed 03:10:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:30 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x1a010000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:30 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="62747266738c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 293.999818] print_req_error: I/O error, dev loop0, sector 128 03:10:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:30 executing program 7: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x4000, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0xc6, 0x200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, &(0x7f0000000200)) readv(r1, &(0x7f0000003900)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1) [ 294.140432] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 294.147727] BTRFS error (device loop1): superblock checksum mismatch 03:10:30 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x7000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="62747266738c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:31 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673c0", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 294.341770] BTRFS error (device loop1): open_ctree failed [ 294.365742] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 294.373055] BTRFS error (device loop1): superblock checksum mismatch 03:10:31 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x8000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x28, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 294.419887] BTRFS error (device loop1): open_ctree failed 03:10:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 294.488118] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 294.495399] BTRFS error (device loop1): superblock checksum mismatch 03:10:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 294.547996] BTRFS error (device loop1): open_ctree failed 03:10:31 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x21000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:31 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 294.837449] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 294.844740] BTRFS error (device loop1): superblock checksum mismatch 03:10:31 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x3200000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 294.929287] BTRFS error (device loop1): open_ctree failed 03:10:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x32, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 294.977574] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 294.984844] BTRFS error (device loop1): superblock checksum mismatch [ 295.094134] BTRFS error (device loop1): open_ctree failed 03:10:31 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(blowfish-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15", 0x4) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x35a, 0x0) clock_getres(0x6, &(0x7f0000000300)) write$P9_RATTACH(r1, &(0x7f0000000140)={0x14, 0x69, 0x1, {0x40, 0x3, 0x3}}, 0x14) getsockname$inet(r1, &(0x7f0000000180)={0x0, 0x0, @rand_addr}, &(0x7f0000000240)=0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000003c0)="dd2e3f96f2605b57", 0x8}], 0x1, &(0x7f0000000440)}, 0x0) recvmmsg(r2, &(0x7f0000006880)=[{{&(0x7f0000000000)=@ipx, 0x80, &(0x7f00000000c0)=[{&(0x7f00000017c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000600)=""/154, 0x9a}}], 0x1, 0x0, 0x0) write$fuse(r1, &(0x7f0000000280)={0x12, 0x0, 0x7, @fuse_notify_poll_wakeup_out={0x4}}, 0x12) 03:10:31 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="627472667301", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:31 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2e00000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="627472667310", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0xc, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 295.311747] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 295.319075] BTRFS error (device loop6): superblock checksum mismatch 03:10:32 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x22000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 295.447653] BTRFS error (device loop6): open_ctree failed 03:10:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = semget$private(0x0, 0x7, 0x100) semctl$IPC_RMID(r1, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x13}, 0x9}, 0x1c) sendto$inet6(r2, &(0x7f0000000040)="df", 0x5, 0x40041, &(0x7f0000000080)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x6}, 0x1c) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x9) r4 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x80) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000180)={0xa, 0x0, [{0x9ae, 0x0, 0x9}, {0xcab, 0x0, 0x7}, {0xbff, 0x0, 0x9b}, {0x40000bf7, 0x0, 0x4}, {0xb90, 0x0, 0x2}, {0xbdd, 0x0, 0x8001}, {0xb37, 0x0, 0x4}, {0xa77, 0x0, 0xccc}, {0xb5f, 0x0, 0x7fff}, {0xff9, 0x0, 0xd3}]}) [ 295.493056] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 295.500318] BTRFS error (device loop6): superblock checksum mismatch 03:10:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="627472667306", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:32 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 295.585327] BTRFS error (device loop6): open_ctree failed [ 295.625409] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 295.632727] BTRFS error (device loop6): superblock checksum mismatch 03:10:32 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x17000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 295.690253] syz-executor7 (15845) used greatest stack depth: 10504 bytes left [ 295.717404] BTRFS error (device loop6): open_ctree failed 03:10:32 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 295.740482] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 295.747779] BTRFS error (device loop6): superblock checksum mismatch 03:10:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x3e, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 295.923944] BTRFS error (device loop6): open_ctree failed 03:10:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:32 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200000, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr=0x9, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14, 0x1b}}, 0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0xfffffffffffffffb, 0xc4, 0x201, 0xffffffffffff0000, 0x1, 0x8, 0x0, 0x1, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000002c0)={r2, 0x58, &(0x7f0000000480)=[@in={0x2, 0x4e21, @loopback=0x7f000001}, @in6={0xa, 0x4e23, 0x6, @empty, 0xffffffffffffffff}, @in6={0xa, 0x4e24, 0x4, @loopback={0x0, 0x1}, 0x8}, @in={0x2, 0x4e20, @broadcast=0xffffffff}]}, &(0x7f0000000440)=0x10) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xfffffffffffffffc, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="fc890790e98de17a83b0bcc0eb5f61a335bfec59e143"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc03006ca64da40ff023122e66f6", 0x0, 0xcfb9e8014199c883, &(0x7f0000000500)=""/206, 0x0, 0xfffffffffffffffd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0xbb, &(0x7f0000000300)=""/187, 0x1}, 0x48) 03:10:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:32 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2f, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:32 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs*', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 296.122257] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 296.129542] BTRFS error (device loop3): superblock checksum mismatch 03:10:32 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x31, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:32 executing program 7: r0 = socket$inet6(0xa, 0x41000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001640)="24000000100007031dfffd946fa2830020200a0009000300001c85680c1ba3a20400ff7e28000000080affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x280000) r3 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$P9_RGETATTR(r2, &(0x7f0000000100)={0xa0, 0x19, 0x2, {0x800, {0x30, 0x3, 0x1}, 0x2, r3, r4, 0x5, 0x200, 0xf620, 0x1, 0x9, 0x400, 0x401, 0xffffffffffff07e3, 0x4, 0x0, 0xffff, 0x6, 0x40, 0xa1}}, 0xa0) [ 296.220735] BTRFS error (device loop3): open_ctree failed 03:10:33 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="62747266730f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 296.281668] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 296.288950] BTRFS error (device loop3): superblock checksum mismatch 03:10:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x5, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 296.388522] netlink: 20 bytes leftover after parsing attributes in process `syz-executor7'. [ 296.416984] BTRFS error (device loop3): open_ctree failed 03:10:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:33 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x4000000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 296.464598] netlink: 20 bytes leftover after parsing attributes in process `syz-executor7'. [ 296.476016] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 296.483476] BTRFS error (device loop3): superblock checksum mismatch 03:10:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 296.554289] BTRFS error (device loop3): open_ctree failed 03:10:33 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:33 executing program 7: r0 = socket$inet6(0xa, 0x41000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001640)="24000000100007031dfffd946fa2830020200a0009000300001c85680c1ba3a20400ff7e28000000080affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x280000) r3 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$P9_RGETATTR(r2, &(0x7f0000000100)={0xa0, 0x19, 0x2, {0x800, {0x30, 0x3, 0x1}, 0x2, r3, r4, 0x5, 0x200, 0xf620, 0x1, 0x9, 0x400, 0x401, 0xffffffffffff07e3, 0x4, 0x0, 0xffff, 0x6, 0x40, 0xa1}}, 0xa0) [ 296.605585] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 296.612924] BTRFS error (device loop1): superblock checksum mismatch [ 296.641691] BTRFS error (device loop1): open_ctree failed [ 296.681775] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 296.689111] BTRFS error (device loop1): superblock checksum mismatch 03:10:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:33 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x6000000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 296.760311] netlink: 20 bytes leftover after parsing attributes in process `syz-executor7'. [ 296.822776] BTRFS error (device loop1): open_ctree failed 03:10:33 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4000, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x8132, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000000)) 03:10:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x7, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:33 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 296.982135] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 296.989446] BTRFS error (device loop3): superblock checksum mismatch 03:10:33 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2f000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:33 executing program 7: r0 = socket$inet(0x2, 0xd, 0xfffffffffffffffa) sysfs$1(0x1, &(0x7f0000000000)="657468302d73656c696e75785dfa5c776c616e303a272d656d3100") r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)="51ad7d476173327097a430e62c4ecbe1bf92725d8825e09adf2cf10a66d983ba3563cc5106cd2aab58217d0b729d6374c31aff6f26efa9b82dfa2ed77287a037993d5299e92d58fb8f92fe56cd6932a64f395cf4b2f8cb2eee6dd467d282c4b355907456a2b326ef0827225c877f7ad57caae267773d34f91c65acc0975f020ebe7afb08cb900dd614166f57d17a26ed1117b221b6e427156197c677", 0x9c, 0xfffffffffffffffa) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) keyctl$chown(0x4, r1, r2, r3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x2, 0x3d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000640], 0x0, &(0x7f0000000440), &(0x7f0000000640)=ANY=[@ANYBLOB="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"]}, 0x448) 03:10:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 297.087839] BTRFS error (device loop3): open_ctree failed [ 297.139200] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 297.146499] BTRFS error (device loop3): superblock checksum mismatch 03:10:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:33 executing program 7: io_setup(0x7, &(0x7f0000000080)=0x0) io_destroy(r0) ioperm(0x0, 0xd8ab, 0xff5) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) bind(r1, &(0x7f0000000000)=@sco={0x1f, {0x0, 0x7, 0x100000000, 0xfffffffffffffffa, 0x3, 0x5}}, 0x80) 03:10:33 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x1800, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 297.205094] BTRFS error (device loop3): open_ctree failed [ 297.229807] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 297.237343] BTRFS error (device loop3): superblock checksum mismatch 03:10:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 297.265337] BTRFS error (device loop3): open_ctree failed [ 297.273401] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 297.280626] BTRFS error (device loop3): superblock checksum mismatch 03:10:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x36, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:34 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000000189000, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, &(0x7f0000001340)={0x0, 0x989680}, &(0x7f0000001480)={0x100000001}, 0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x88000, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x5, 0x4) [ 297.379686] BTRFS error (device loop3): open_ctree failed [ 297.403531] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 297.410814] BTRFS error (device loop3): superblock checksum mismatch [ 297.500008] BTRFS error (device loop3): open_ctree failed [ 297.516753] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 297.524049] BTRFS error (device loop3): superblock checksum mismatch 03:10:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:34 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x1200, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 297.556241] BTRFS error (device loop3): open_ctree failed [ 297.578842] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 297.586063] BTRFS error (device loop3): superblock checksum mismatch 03:10:34 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 297.702400] BTRFS error (device loop3): open_ctree failed 03:10:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:34 executing program 7: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x1}) syz_open_procfs(0x0, &(0x7f0000000040)='uid_map\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) rt_sigtimedwait(&(0x7f0000a72000)={0x563}, &(0x7f0000000080), &(0x7f0000000040), 0x8) 03:10:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1500, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="627472667310", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:34 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x22, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 297.765984] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 297.773252] BTRFS error (device loop3): superblock checksum mismatch [ 297.794663] BTRFS error (device loop3): open_ctree failed [ 297.812741] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 297.820007] BTRFS error (device loop3): superblock checksum mismatch 03:10:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673e4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="627472667303", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:34 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0xb, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 297.917543] BTRFS error (device loop3): open_ctree failed [ 297.931685] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 297.938928] BTRFS error (device loop3): superblock checksum mismatch [ 297.993510] BTRFS error (device loop3): open_ctree failed 03:10:34 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000580), 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x48e}]}) 03:10:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x2c, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 298.042191] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 298.049479] BTRFS error (device loop3): superblock checksum mismatch [ 298.100928] BTRFS error (device loop3): open_ctree failed [ 298.109652] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 298.117092] BTRFS error (device loop3): superblock checksum mismatch 03:10:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:34 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 298.142137] BTRFS error (device loop3): open_ctree failed [ 298.155271] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 298.162681] BTRFS error (device loop3): superblock checksum mismatch [ 298.198942] BTRFS error (device loop3): open_ctree failed 03:10:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 298.328371] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 298.335764] BTRFS error (device loop6): superblock checksum mismatch [ 298.404464] BTRFS error (device loop6): open_ctree failed 03:10:35 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x200000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:35 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:35 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="8500e927000000342a00009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000740)={'lo\x00', 0x0}) sendmsg$xdp(r1, &(0x7f0000000b80)={&(0x7f0000000780)={0x2c, 0x1, r2, 0x1f}, 0x10, &(0x7f0000000b00)=[{&(0x7f00000007c0)="17ef5bb236556a9646beda59eb8d9677dddc8d61fab1b6cb54a74db53bd39df09ff7164102", 0x25}, {&(0x7f0000000800)="61e7c47239d74e4523372da4286bcff194be7621", 0x14}, {&(0x7f0000000840)="fbcd8324f765ec41ab464a14927d8741e3462a9fbccdbbf8cd413a71349f032a071fea1b4ea10299992c0bbb40b9973c7a8ddddd9d96c0b0a6335fb58058b4c8e18723304eb7ec8b2af4825631e34ba2d7fdd1951e953107d222a88c8a18485a65ff6a5772ffa3f4ed725914d66b16284eecb68491c3386440351646dae214292f17cd46060314ad1a93822c69a5c00c9a169834ac4d3f49acae47f8232b03d3b4c2e61d80cf93658f6033f00eb1849db7b5a3964f0b96f1435a73f23fa610c0529fccba34e7e74cd6837e3c8b9745ef96a245a8e7c1", 0xd6}, {&(0x7f0000000940)="60547735a5c2b06ab1fe9610df9d28c75efbe5029f756d470d7fbbf1e9d5c80ec1cc2431e8eb278e5bb9fd6647840be4ef5f6cc34e3210589bbc3fdc3e60ed4baafa4ceac80c911ccfbcc0de731562064d832fc191390081fb162b57957274c7034edb26627cb62ee26b580ed398ce0c157d7d310f7593f0daa7f7633bf58306e43420265ab8922e0025b2d1266b0a51c339e3aa2c415c4c4611271db0536bd4d1d1418b0bdb4d66b392a11eeb46d9d9c59fe805c8fd7462f06bb38c68633f9b5b09f1e4b258272c69da927a3ec4183bcfdcb1e0c5a814575ba4bda88c", 0xdd}, {&(0x7f0000000a40)="9f12e3a03f052841f658337ad6c1dd38b5983164dcdf7ac310db77efeba7cc9fe3088b9be24c6878f61b7f0d76283c7547bb8344e27726cfbc2af9cd9108c0c3aac9e37314bf90d1ad0b92ef5a73cf09bcd0341571855ca0b6f68a914dc0a04ff22048ae6ed3045420b7c0d42f38f19642b640400ac421f81eb3479a9c6bd50f13bd18d7d60f4774d31eebb5236dd7746bdb64369f989b54057305a385b3fc03", 0xa0}], 0x5}, 0x40004) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000180)={0x5, 0x10, 0xfa00, {&(0x7f00000004c0), r3}}, 0x18) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0xaf, &(0x7f0000000100)="fd86b00eb8dd06e3ad071cd4685c", &(0x7f00000001c0)=""/175}, 0x28) [ 298.449414] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 298.456643] BTRFS error (device loop6): superblock checksum mismatch 03:10:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 298.522430] BTRFS error (device loop6): open_ctree failed [ 298.542823] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 298.550177] BTRFS error (device loop6): superblock checksum mismatch 03:10:35 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x12, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:35 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x12000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:35 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1fd, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)=0xfffffffffffffffd) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080), &(0x7f0000000100)=0x4) mmap$xdp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8, 0x104033, r1, 0x80000000) 03:10:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs,', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:35 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 298.680647] BTRFS error (device loop6): open_ctree failed [ 298.751137] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 298.758424] BTRFS error (device loop6): superblock checksum mismatch 03:10:35 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0xd, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 298.841650] BTRFS error (device loop6): open_ctree failed [ 298.881779] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 298.889059] BTRFS error (device loop6): superblock checksum mismatch [ 298.916420] BTRFS error (device loop6): open_ctree failed [ 298.925149] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 298.932443] BTRFS error (device loop6): superblock checksum mismatch [ 298.955504] BTRFS error (device loop6): open_ctree failed 03:10:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:35 executing program 7: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x12000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x27, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 298.963774] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 298.971071] BTRFS error (device loop6): superblock checksum mismatch [ 299.014606] BTRFS error (device loop6): open_ctree failed 03:10:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:35 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="627472667305", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:35 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x1000000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8890e, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl(r1, 0x3ff, &(0x7f0000000080)="99f94279ebae773fbef3a3") syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x18001) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in=@rand_addr, @in6=@mcast2}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) personality(0x4000005) [ 299.158750] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 299.166053] BTRFS error (device loop1): superblock checksum mismatch [ 299.182373] BTRFS error (device loop1): open_ctree failed 03:10:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:36 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x600000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 299.230934] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 299.238259] BTRFS error (device loop3): superblock checksum mismatch 03:10:36 executing program 7: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x400) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) ioctl$KVM_GET_REG_LIST(r1, 0x800452d3, &(0x7f0000000080)={0xa00000000000000}) 03:10:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x2a, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 299.287323] BTRFS error (device loop3): open_ctree failed 03:10:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="62747266731c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 299.353284] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 299.360571] BTRFS error (device loop3): superblock checksum mismatch 03:10:36 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 299.425726] BTRFS error (device loop3): open_ctree failed 03:10:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 299.474822] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 299.482080] BTRFS error (device loop1): superblock checksum mismatch 03:10:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:36 executing program 7: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x400) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) ioctl$KVM_GET_REG_LIST(r1, 0x800452d3, &(0x7f0000000080)={0xa00000000000000}) 03:10:36 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x1100000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 299.669061] BTRFS error (device loop1): open_ctree failed 03:10:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:36 executing program 7: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x400) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) ioctl$KVM_GET_REG_LIST(r1, 0x800452d3, &(0x7f0000000080)={0xa00000000000000}) [ 299.710834] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 299.718169] BTRFS error (device loop1): superblock checksum mismatch [ 299.739365] BTRFS error (device loop1): open_ctree failed [ 299.751458] BTRFS error (device loop1): unsupported checksum algorithm 3786 03:10:36 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x700, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 299.758714] BTRFS error (device loop1): superblock checksum mismatch [ 299.803328] BTRFS error (device loop1): open_ctree failed [ 299.841360] BTRFS error (device loop1): unsupported checksum algorithm 3786 03:10:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 299.848702] BTRFS error (device loop1): superblock checksum mismatch 03:10:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0xac14140b, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:36 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 299.934818] BTRFS error (device loop1): open_ctree failed 03:10:36 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x13, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 299.983980] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 299.991258] BTRFS error (device loop1): superblock checksum mismatch 03:10:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 300.053847] BTRFS error (device loop1): open_ctree failed [ 300.085999] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 300.093320] BTRFS error (device loop1): superblock checksum mismatch 03:10:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x18, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 300.142524] BTRFS error (device loop1): open_ctree failed [ 300.173958] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 300.181250] BTRFS error (device loop1): superblock checksum mismatch 03:10:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:36 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce55672b8e492664e624e0efe078f2e3aa38061af373a3d160cfbe9b6318577fabec9baa14a9377d7ffef2b72f36353de7db160717b00a6f6055d08594df3bff", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:36 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x60000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 300.221768] BTRFS error (device loop1): open_ctree failed [ 300.294711] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 300.302078] BTRFS error (device loop1): superblock checksum mismatch [ 300.339496] BTRFS error (device loop1): open_ctree failed [ 300.360271] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 300.367575] BTRFS error (device loop1): superblock checksum mismatch 03:10:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2a000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:37 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x80}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x0, 0x20}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r3, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x3f) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f00000005c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xa}, @rand_addr}, 0xc) 03:10:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0xd, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 300.396704] BTRFS error (device loop1): open_ctree failed [ 300.421145] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 300.428374] BTRFS error (device loop1): superblock checksum mismatch 03:10:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsi', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 300.483541] BTRFS error (device loop1): open_ctree failed 03:10:37 executing program 7: r0 = socket$inet6(0xa, 0x200000003, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) [ 300.559998] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 300.567357] BTRFS error (device loop6): superblock checksum mismatch 03:10:37 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0xb000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 7: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x80, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000300)=""/126) r1 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f691c0264192f42be07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x28) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000140)={r2, 0x200, 0x30, 0x7ff, 0x8ba}, &(0x7f0000000200)=0x18) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000380)=""/129) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') 03:10:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 300.711223] BTRFS error (device loop6): open_ctree failed [ 300.772842] BTRFS error (device loop6): unsupported checksum algorithm 3786 03:10:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673c0", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0xffffffc0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:37 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x1700000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x17, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:37 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x4000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f0", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x11000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="627472667304", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x29, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0xa00, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:10:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x31000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsq', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x23, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fc", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) 03:10:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="627472667310", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:39 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0xa, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 302.481215] btrfs_printk: 53 callbacks suppressed [ 302.481228] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 302.493437] BTRFS error (device loop3): superblock checksum mismatch [ 302.541521] BTRFS error (device loop3): open_ctree failed 03:10:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)="627472667302", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f5", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 302.671514] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 302.678823] BTRFS error (device loop3): superblock checksum mismatch 03:10:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:39 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2d00000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x2b, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 302.949252] BTRFS error (device loop3): open_ctree failed [ 302.986140] BTRFS error (device loop3): unsupported checksum algorithm 3786 [ 302.993465] BTRFS error (device loop3): superblock checksum mismatch 03:10:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 303.032607] BTRFS error (device loop3): open_ctree failed 03:10:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:39 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0xb00000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 303.210334] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 303.217632] BTRFS error (device loop6): superblock checksum mismatch 03:10:40 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0xffffff82, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="62747266730f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:40 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x1a01000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 303.405742] BTRFS error (device loop6): open_ctree failed [ 303.450671] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 303.457943] BTRFS error (device loop6): superblock checksum mismatch 03:10:40 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 303.539422] BTRFS error (device loop6): open_ctree failed [ 303.571560] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 303.578855] BTRFS error (device loop6): superblock checksum mismatch 03:10:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x25, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673eb", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 303.695188] BTRFS error (device loop6): open_ctree failed 03:10:40 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035f", 0x6b, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:40 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2200000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 303.737875] print_req_error: I/O error, dev loop0, sector 128 [ 303.761254] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 303.768516] BTRFS error (device loop1): superblock checksum mismatch 03:10:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 303.909639] BTRFS error (device loop1): open_ctree failed [ 303.938818] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 303.946150] BTRFS error (device loop1): superblock checksum mismatch 03:10:40 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x19000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="627472667304", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673a6", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 304.008932] BTRFS error (device loop1): open_ctree failed [ 304.022242] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 304.029595] BTRFS error (device loop1): superblock checksum mismatch 03:10:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 304.070436] BTRFS error (device loop1): open_ctree failed [ 304.078133] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 304.085364] BTRFS error (device loop1): superblock checksum mismatch 03:10:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x3a, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:40 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035f", 0x6b, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 304.164342] BTRFS error (device loop1): open_ctree failed [ 304.196907] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 304.204193] BTRFS error (device loop1): superblock checksum mismatch 03:10:40 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2a00, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 304.316224] BTRFS error (device loop1): open_ctree failed [ 304.358130] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 304.365445] BTRFS error (device loop1): superblock checksum mismatch 03:10:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2100, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 304.431380] BTRFS error (device loop1): open_ctree failed [ 304.458344] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 304.465616] BTRFS error (device loop1): superblock checksum mismatch 03:10:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673e8", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0xffffffc2, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:10:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fe", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) [ 304.610362] BTRFS error (device loop1): open_ctree failed [ 304.641980] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 304.649252] BTRFS error (device loop1): superblock checksum mismatch 03:10:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035f", 0x6b, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x600, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:41 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x20e33fe1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 304.744572] BTRFS error (device loop1): open_ctree failed 03:10:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) [ 304.801355] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 304.808611] BTRFS error (device loop1): superblock checksum mismatch [ 304.843554] BTRFS error (device loop1): open_ctree failed [ 304.884102] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 304.891400] BTRFS error (device loop1): superblock checksum mismatch [ 304.921655] BTRFS error (device loop1): open_ctree failed [ 304.939614] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 304.946961] BTRFS error (device loop1): superblock checksum mismatch [ 304.985821] BTRFS error (device loop1): open_ctree failed [ 305.012370] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 305.019624] BTRFS error (device loop1): superblock checksum mismatch [ 305.048705] BTRFS error (device loop1): open_ctree failed [ 305.063257] BTRFS error (device loop1): unsupported checksum algorithm 3786 [ 305.070496] BTRFS error (device loop1): superblock checksum mismatch [ 305.077668] BTRFS error (device loop1): open_ctree failed [ 305.088602] BTRFS error (device loop1): unsupported checksum algorithm 3786 03:10:41 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x227e) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x31, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 305.095881] BTRFS error (device loop1): superblock checksum mismatch 03:10:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2d00, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) 03:10:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000080)="627472667303", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945", 0xa1, 0x10000}], 0x0, &(0x7f0000000240)) [ 305.130062] BTRFS error (device loop1): open_ctree failed 03:10:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="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", 0x113, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c5ee539c37d1f23b763ce5567", 0xd6, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 03:10:41 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0xd00000000000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 305.260199] WARNING: CPU: 0 PID: 17077 at fs/btrfs/volumes.c:1071 close_fs_devices+0xbf0/0xfd0 [ 305.269022] Kernel panic - not syncing: panic_on_warn set ... [ 305.269022] [ 305.276409] CPU: 0 PID: 17077 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #142 [ 305.283785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.293157] Call Trace: [ 305.295768] dump_stack+0x1c9/0x2b4 [ 305.299417] ? dump_stack_print_info.cold.2+0x52/0x52 [ 305.304639] panic+0x238/0x4e7 03:10:42 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945", 0xa1, 0x10000}], 0x0, &(0x7f0000000240)) [ 305.307853] ? add_taint.cold.5+0x16/0x16 [ 305.312020] ? __warn.cold.8+0x148/0x1ba [ 305.316100] ? close_fs_devices+0xbf0/0xfd0 [ 305.320438] __warn.cold.8+0x163/0x1ba [ 305.324338] ? close_fs_devices+0xbf0/0xfd0 [ 305.328679] report_bug+0x252/0x2d0 [ 305.332328] do_error_trap+0x1fc/0x4d0 [ 305.336234] ? trace_hardirqs_on+0xd/0x10 [ 305.340393] ? math_error+0x3e0/0x3e0 [ 305.344205] ? note_gp_changes+0x550/0x550 [ 305.348449] ? __blkdev_put+0x3f1/0x830 [ 305.352445] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:10:42 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0xc000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 305.357304] do_invalid_op+0x1b/0x20 [ 305.361025] invalid_op+0x14/0x20 [ 305.364493] RIP: 0010:close_fs_devices+0xbf0/0xfd0 [ 305.369419] Code: 4a af fe 0f 0b e8 d0 4a af fe 0f 0b 48 89 f7 e8 f6 24 ed fe e9 de f5 ff ff e8 bc 4a af fe 0f 0b e9 fd fd ff ff e8 b0 4a af fe <0f> 0b e9 a8 fd ff ff 48 8b bd 58 fd ff ff e8 8d 25 ed fe e9 35 fd [ 305.388772] RSP: 0018:ffff8801b18ff050 EFLAGS: 00010216 [ 305.394158] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc90001e0c000 [ 305.401437] RDX: 00000000000074ee RSI: ffffffff82ccc0f0 RDI: 0000000000000007 [ 305.408710] RBP: ffff8801b18ff350 R08: ffff8801966945c0 R09: 0000000000000006 [ 305.415987] R10: ffff8801966945c0 R11: 0000000000000000 R12: ffffed003631fe2d [ 305.423266] R13: 1ffff1003631fe1d R14: ffff8801b18ff0e8 R15: ffff880191e1ad88 [ 305.430568] ? close_fs_devices+0xbf0/0xfd0 [ 305.434926] ? btrfs_alloc_device+0x8e0/0x8e0 [ 305.439470] ? do_raw_spin_unlock+0xa7/0x2f0 [ 305.443907] ? kasan_check_write+0x14/0x20 [ 305.448156] ? wake_up_q+0xb3/0x100 [ 305.451800] ? __mutex_unlock_slowpath+0x439/0x8c0 03:10:42 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x16000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 305.456744] ? wait_for_completion+0x8d0/0x8d0 [ 305.461356] btrfs_close_devices+0x29/0x150 [ 305.465685] btrfs_mount_root+0x143c/0x1e90 [ 305.470029] ? btrfs_decode_error+0x70/0x70 [ 305.474367] ? save_stack+0x43/0xd0 [ 305.478004] ? __kasan_slab_free+0x11a/0x170 [ 305.482415] ? kasan_slab_free+0xe/0x10 [ 305.486394] ? kfree+0xd9/0x260 [ 305.489684] ? mount_fs+0xae/0x328 [ 305.493231] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 305.497996] ? do_mount+0x581/0x30e0 [ 305.501742] ? ksys_mount+0x12d/0x140 [ 305.505551] ? __x64_sys_mount+0xbe/0x150 03:10:42 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x1000000, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 305.509702] ? do_syscall_64+0x1b9/0x820 [ 305.513768] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.519135] ? kasan_check_read+0x11/0x20 [ 305.523283] ? do_raw_spin_unlock+0xa7/0x2f0 [ 305.527704] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 305.532303] ? do_raw_spin_lock+0xc1/0x200 [ 305.536554] mount_fs+0xae/0x328 [ 305.539932] ? debug_check_no_obj_freed+0x30b/0x595 [ 305.544972] vfs_kern_mount.part.34+0xdc/0x4e0 [ 305.549573] ? may_umount+0xb0/0xb0 [ 305.553224] ? kfree+0x111/0x260 [ 305.556610] ? btrfs_mount+0x84c/0x215e 03:10:42 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x8004, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 305.560602] vfs_kern_mount+0x40/0x60 [ 305.564415] btrfs_mount+0x4a9/0x215e [ 305.568227] ? kasan_check_read+0x11/0x20 [ 305.572374] ? rcu_is_watching+0x8c/0x150 [ 305.576548] ? btrfs_remount+0x1710/0x1710 [ 305.580798] ? __lockdep_init_map+0x105/0x590 [ 305.585305] ? __lockdep_init_map+0x105/0x590 [ 305.589814] ? lockdep_init_map+0x9/0x10 [ 305.593927] ? __init_waitqueue_head+0x9e/0x150 [ 305.598607] ? init_wait_entry+0x1c0/0x1c0 [ 305.602863] ? memcpy+0x45/0x50 [ 305.606197] ? alloc_vfsmnt+0x779/0x9f0 03:10:42 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x2200, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 305.610200] ? mnt_free_id.isra.27+0x60/0x60 [ 305.614620] ? kasan_check_read+0x11/0x20 [ 305.618773] ? graph_lock+0x170/0x170 [ 305.622576] ? rcu_pm_notify+0xc0/0xc0 [ 305.626507] ? find_held_lock+0x36/0x1c0 [ 305.630587] ? lock_downgrade+0x8f0/0x8f0 [ 305.634753] mount_fs+0xae/0x328 [ 305.638128] ? btrfs_remount+0x1710/0x1710 [ 305.642370] ? mount_fs+0xae/0x328 [ 305.645916] ? mpi_free.cold.1+0x19/0x19 [ 305.649990] vfs_kern_mount.part.34+0xdc/0x4e0 [ 305.654590] ? may_umount+0xb0/0xb0 03:10:42 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xff3a) listen(r0, 0x0) setsockopt$inet_mreqsrc(r0, 0x1300, 0x0, &(0x7f0000000040)={@broadcast=0xffffffff, @multicast2=0xe0000002, @rand_addr}, 0xc) [ 305.658238] ? _raw_read_unlock+0x22/0x30 [ 305.662398] ? __get_fs_type+0x97/0xc0 [ 305.666308] do_mount+0x581/0x30e0 [ 305.669863] ? copy_mount_string+0x40/0x40 [ 305.674112] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 305.678889] ? retint_kernel+0x10/0x10 [ 305.682796] ? copy_mount_options+0x1a1/0x380 [ 305.687301] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 305.692161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.697704] ? copy_mount_options+0x285/0x380 [ 305.702210] ksys_mount+0x12d/0x140 [ 305.705888] __x64_sys_mount+0xbe/0x150 [ 305.709882] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 305.714910] do_syscall_64+0x1b9/0x820 [ 305.718798] ? finish_task_switch+0x1d3/0x870 [ 305.723297] ? syscall_return_slowpath+0x5e0/0x5e0 [ 305.728231] ? syscall_return_slowpath+0x31d/0x5e0 [ 305.733188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.738733] ? retint_user+0x18/0x18 [ 305.742458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.747314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.752508] RIP: 0033:0x45885a [ 305.755690] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 305.775060] RSP: 002b:00007f53b7997a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 305.782816] RAX: ffffffffffffffda RBX: 00007f53b7997b30 RCX: 000000000045885a [ 305.790097] RDX: 00007f53b7997ad0 RSI: 0000000020000100 RDI: 00007f53b7997af0 [ 305.797398] RBP: 0000000020000100 R08: 00007f53b7997b30 R09: 00007f53b7997ad0 [ 305.804678] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000013 [ 305.811980] R13: 0000000000000000 R14: 00000000004d3e38 R15: 0000000000000000 [ 305.820048] Dumping ftrace buffer: [ 305.824081] (ftrace buffer empty) [ 305.827778] Kernel Offset: disabled [ 305.831392] Rebooting in 86400 seconds..