.cold.4+0xa/0x1a [ 537.473149] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 537.478273] ? graph_lock+0x170/0x170 [ 537.482078] ? find_held_lock+0x36/0x1c0 [ 537.486160] ? __lock_is_held+0xb5/0x140 [ 537.490260] ? check_same_owner+0x340/0x340 [ 537.494620] ? perf_trace_lock+0x920/0x920 [ 537.498865] ? rcu_note_context_switch+0x730/0x730 [ 537.503851] __should_failslab+0x124/0x180 [ 537.508101] should_failslab+0x9/0x14 [ 537.511912] kmem_cache_alloc+0x2af/0x760 [ 537.516076] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 537.521116] __kernfs_new_node+0xef/0x5a0 [ 537.525292] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 537.530076] ? lock_downgrade+0x8f0/0x8f0 [ 537.534242] ? lock_release+0xa30/0xa30 [ 537.538244] ? lock_downgrade+0x8f0/0x8f0 [ 537.542403] kernfs_new_node+0x80/0xf0 [ 537.546311] kernfs_create_dir_ns+0x3d/0x140 [ 537.550775] internal_create_group+0x110/0x970 [ 537.555373] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 537.560404] sysfs_create_group+0x1f/0x30 [ 537.564573] lo_ioctl+0x12c8/0x1d10 [ 537.568209] ? lo_rw_aio_complete+0x450/0x450 [ 537.572724] blkdev_ioctl+0x9cd/0x2030 [ 537.576628] ? blkpg_ioctl+0xc40/0xc40 [ 537.580547] ? lock_downgrade+0x8f0/0x8f0 [ 537.584752] ? kasan_check_read+0x11/0x20 [ 537.588910] ? rcu_is_watching+0x8c/0x150 [ 537.593068] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 537.597491] ? __fget+0x414/0x670 [ 537.600951] ? expand_files.part.8+0x9c0/0x9c0 [ 537.605529] block_ioctl+0xee/0x130 [ 537.609164] ? blkdev_fallocate+0x400/0x400 [ 537.613495] do_vfs_ioctl+0x1de/0x1720 [ 537.617386] ? rcu_is_watching+0x8c/0x150 [ 537.621539] ? ioctl_preallocate+0x300/0x300 [ 537.625940] ? __fget_light+0x2f7/0x440 [ 537.629911] ? fget_raw+0x20/0x20 [ 537.633353] ? putname+0xf2/0x130 [ 537.636825] ? rcu_read_lock_sched_held+0x108/0x120 [ 537.641849] ? kmem_cache_free+0x25c/0x2d0 [ 537.646090] ? putname+0xf7/0x130 [ 537.649556] ? do_sys_open+0x3cb/0x760 [ 537.653571] ? security_file_ioctl+0x94/0xc0 [ 537.658025] ksys_ioctl+0xa9/0xd0 [ 537.661498] __x64_sys_ioctl+0x73/0xb0 [ 537.665393] do_syscall_64+0x1b9/0x820 [ 537.669281] ? syscall_return_slowpath+0x5e0/0x5e0 [ 537.674208] ? syscall_return_slowpath+0x31d/0x5e0 [ 537.679146] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 537.684513] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 537.689366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.694573] RIP: 0033:0x455927 [ 537.697773] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.717039] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 537.724868] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 537.732422] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 537.739691] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 537.746976] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 537.754261] R13: 0000000000000000 R14: 00000000004d3c90 R15: 0000000000000008 22:53:03 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x3}, 0x0) 22:53:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:03 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcb1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:03 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00090000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e071, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3a6, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:03 executing program 5 (fault-call:2 fault-nth:9): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 537.955792] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 537.970831] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:03 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x100000000000000}, 0x0) [ 538.254947] FAULT_INJECTION: forcing a failure. [ 538.254947] name failslab, interval 1, probability 0, space 0, times 0 [ 538.266440] CPU: 1 PID: 9170 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 538.273760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.283173] Call Trace: [ 538.285787] dump_stack+0x1c9/0x2b4 [ 538.289450] ? dump_stack_print_info.cold.2+0x52/0x52 [ 538.294671] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 538.299552] should_fail.cold.4+0xa/0x1a 22:53:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801b04fdb98, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:04 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x40030000000000}, 0x0) [ 538.303645] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 538.308784] ? mutex_trylock+0x2b0/0x2b0 [ 538.312867] ? graph_lock+0x170/0x170 [ 538.316683] ? ___ratelimit.cold.2+0x6b/0x6b [ 538.321115] ? save_stack+0x43/0xd0 [ 538.324778] ? find_held_lock+0x36/0x1c0 [ 538.328874] ? __lock_is_held+0xb5/0x140 [ 538.332996] ? check_same_owner+0x340/0x340 [ 538.337441] ? rcu_note_context_switch+0x730/0x730 [ 538.342409] __should_failslab+0x124/0x180 [ 538.346668] should_failslab+0x9/0x14 [ 538.350490] kmem_cache_alloc+0x2af/0x760 22:53:04 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00480000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 538.354650] ? wait_for_completion+0x8d0/0x8d0 [ 538.359247] ? graph_lock+0x170/0x170 [ 538.363063] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 538.368095] __kernfs_new_node+0xef/0x5a0 [ 538.372268] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 538.377072] ? mutex_unlock+0xd/0x10 [ 538.380818] ? kernfs_activate+0x21a/0x2c0 [ 538.385091] kernfs_new_node+0x80/0xf0 [ 538.389027] __kernfs_create_file+0x4d/0x330 [ 538.393480] sysfs_add_file_mode_ns+0x21a/0x560 [ 538.398197] internal_create_group+0x282/0x970 [ 538.402834] sysfs_create_group+0x1f/0x30 [ 538.407097] lo_ioctl+0x12c8/0x1d10 [ 538.410771] ? lo_rw_aio_complete+0x450/0x450 [ 538.415387] blkdev_ioctl+0x9cd/0x2030 [ 538.419311] ? blkpg_ioctl+0xc40/0xc40 [ 538.423237] ? lock_downgrade+0x8f0/0x8f0 [ 538.427427] ? kasan_check_read+0x11/0x20 [ 538.431600] ? rcu_is_watching+0x8c/0x150 [ 538.435780] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 538.440314] ? __fget+0x414/0x670 [ 538.443805] ? expand_files.part.8+0x9c0/0x9c0 [ 538.448430] block_ioctl+0xee/0x130 [ 538.452085] ? blkdev_fallocate+0x400/0x400 [ 538.456438] do_vfs_ioctl+0x1de/0x1720 [ 538.460350] ? rcu_is_watching+0x8c/0x150 [ 538.464526] ? ioctl_preallocate+0x300/0x300 [ 538.468959] ? __fget_light+0x2f7/0x440 [ 538.472960] ? fget_raw+0x20/0x20 [ 538.476432] ? putname+0xf2/0x130 [ 538.479911] ? rcu_read_lock_sched_held+0x108/0x120 [ 538.484959] ? kmem_cache_free+0x25c/0x2d0 [ 538.489657] ? putname+0xf7/0x130 [ 538.493139] ? do_sys_open+0x3cb/0x760 [ 538.497058] ? security_file_ioctl+0x94/0xc0 [ 538.501509] ksys_ioctl+0xa9/0xd0 [ 538.505016] __x64_sys_ioctl+0x73/0xb0 [ 538.508939] do_syscall_64+0x1b9/0x820 [ 538.512850] ? finish_task_switch+0x1d3/0x870 [ 538.517367] ? syscall_return_slowpath+0x5e0/0x5e0 [ 538.522321] ? syscall_return_slowpath+0x31d/0x5e0 [ 538.527286] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 538.532683] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 538.538691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.543906] RIP: 0033:0x455927 [ 538.547105] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.566529] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 538.574260] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 538.581571] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 538.589039] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 538.596304] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 538.603559] R13: 0000000000000000 R14: 00000000004d3c90 R15: 0000000000000009 [ 538.625864] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1500, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:04 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 538.765394] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 538.978232] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 538.985515] BTRFS error (device loop2): superblock checksum mismatch [ 539.054606] BTRFS error (device loop2): open_ctree failed 22:53:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e088, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:05 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0xf0ffffff}, 0x0) 22:53:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000080000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:05 executing program 3: nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:05 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3600, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:05 executing program 5 (fault-call:2 fault-nth:10): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xea24, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 539.405483] FAULT_INJECTION: forcing a failure. [ 539.405483] name failslab, interval 1, probability 0, space 0, times 0 [ 539.416995] CPU: 1 PID: 9248 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 539.424290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.433671] Call Trace: [ 539.436287] dump_stack+0x1c9/0x2b4 [ 539.439940] ? dump_stack_print_info.cold.2+0x52/0x52 [ 539.445156] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 539.450039] should_fail.cold.4+0xa/0x1a 22:53:05 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x2000000}, 0x0) 22:53:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000060000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 539.454137] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 539.459273] ? mutex_trylock+0x2b0/0x2b0 [ 539.463359] ? graph_lock+0x170/0x170 [ 539.467181] ? ___ratelimit.cold.2+0x6b/0x6b [ 539.471619] ? save_stack+0x43/0xd0 [ 539.475294] ? find_held_lock+0x36/0x1c0 [ 539.479384] ? __lock_is_held+0xb5/0x140 [ 539.483474] ? check_same_owner+0x340/0x340 [ 539.488322] ? rcu_note_context_switch+0x730/0x730 [ 539.493279] __should_failslab+0x124/0x180 [ 539.497628] should_failslab+0x9/0x14 [ 539.501458] kmem_cache_alloc+0x2af/0x760 [ 539.505631] ? wait_for_completion+0x8d0/0x8d0 [ 539.510258] ? graph_lock+0x170/0x170 [ 539.514095] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 539.519151] __kernfs_new_node+0xef/0x5a0 [ 539.523367] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 539.528166] ? mutex_unlock+0xd/0x10 [ 539.531903] ? kernfs_activate+0x21a/0x2c0 [ 539.536177] kernfs_new_node+0x80/0xf0 [ 539.540110] __kernfs_create_file+0x4d/0x330 [ 539.544813] sysfs_add_file_mode_ns+0x21a/0x560 [ 539.549696] internal_create_group+0x282/0x970 22:53:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e096, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 539.554321] sysfs_create_group+0x1f/0x30 [ 539.558587] lo_ioctl+0x12c8/0x1d10 [ 539.562245] ? lo_rw_aio_complete+0x450/0x450 [ 539.566767] blkdev_ioctl+0x9cd/0x2030 [ 539.570682] ? blkpg_ioctl+0xc40/0xc40 [ 539.574603] ? lock_downgrade+0x8f0/0x8f0 [ 539.578789] ? kasan_check_read+0x11/0x20 [ 539.582962] ? rcu_is_watching+0x8c/0x150 [ 539.587137] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 539.591579] ? __fget+0x414/0x670 [ 539.595064] ? expand_files.part.8+0x9c0/0x9c0 [ 539.599673] block_ioctl+0xee/0x130 [ 539.603325] ? blkdev_fallocate+0x400/0x400 [ 539.608788] do_vfs_ioctl+0x1de/0x1720 [ 539.612701] ? rcu_is_watching+0x8c/0x150 [ 539.616877] ? ioctl_preallocate+0x300/0x300 [ 539.621309] ? __fget_light+0x2f7/0x440 [ 539.625398] ? fget_raw+0x20/0x20 [ 539.628877] ? putname+0xf2/0x130 [ 539.632355] ? rcu_read_lock_sched_held+0x108/0x120 [ 539.637399] ? kmem_cache_free+0x25c/0x2d0 [ 539.641665] ? putname+0xf7/0x130 [ 539.645138] ? do_sys_open+0x3cb/0x760 [ 539.649054] ? security_file_ioctl+0x94/0xc0 [ 539.653493] ksys_ioctl+0xa9/0xd0 [ 539.656965] __x64_sys_ioctl+0x73/0xb0 [ 539.660872] do_syscall_64+0x1b9/0x820 [ 539.664774] ? finish_task_switch+0x1d3/0x870 [ 539.669293] ? syscall_return_slowpath+0x5e0/0x5e0 [ 539.674243] ? syscall_return_slowpath+0x31d/0x5e0 [ 539.679205] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 539.684607] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 539.689487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.694699] RIP: 0033:0x455927 [ 539.697895] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 539.717366] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 539.725077] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 539.732343] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 539.739703] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 539.747087] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 539.754359] R13: 0000000000000000 R14: 00000000004d3c90 R15: 000000000000000a [ 539.782971] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:05 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0xf0}, 0x0) 22:53:05 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcad, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0097ffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 539.914153] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:05 executing program 5 (fault-call:2 fault-nth:11): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801b3672118, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0xffffff9e}, 0x0) 22:53:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801c2ea5b98, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 540.262504] FAULT_INJECTION: forcing a failure. [ 540.262504] name failslab, interval 1, probability 0, space 0, times 0 [ 540.274124] CPU: 0 PID: 9313 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 540.281528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.290893] Call Trace: [ 540.293511] dump_stack+0x1c9/0x2b4 [ 540.297172] ? dump_stack_print_info.cold.2+0x52/0x52 [ 540.302394] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 540.307261] ? __mutex_lock+0x7e8/0x1820 [ 540.311392] should_fail.cold.4+0xa/0x1a [ 540.315503] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 540.320645] ? graph_lock+0x170/0x170 [ 540.324513] ? find_held_lock+0x36/0x1c0 [ 540.330171] ? __lock_is_held+0xb5/0x140 [ 540.334268] ? check_same_owner+0x340/0x340 [ 540.338614] ? kasan_check_write+0x14/0x20 [ 540.342880] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 540.347826] ? rcu_note_context_switch+0x730/0x730 [ 540.352775] __should_failslab+0x124/0x180 [ 540.357038] should_failslab+0x9/0x14 [ 540.360861] kmem_cache_alloc+0x2af/0x760 [ 540.365039] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 540.370086] __kernfs_new_node+0xef/0x5a0 [ 540.374300] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 540.379368] ? mutex_unlock+0xd/0x10 [ 540.383103] ? kernfs_activate+0x21a/0x2c0 [ 540.387457] ? kernfs_walk_and_get_ns+0x340/0x340 [ 540.392349] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 540.397909] ? kernfs_link_sibling+0x1d2/0x3b0 [ 540.402525] kernfs_new_node+0x80/0xf0 [ 540.406442] __kernfs_create_file+0x4d/0x330 [ 540.410877] sysfs_add_file_mode_ns+0x21a/0x560 [ 540.415601] internal_create_group+0x282/0x970 [ 540.420232] sysfs_create_group+0x1f/0x30 [ 540.424399] lo_ioctl+0x12c8/0x1d10 [ 540.428052] ? lo_rw_aio_complete+0x450/0x450 [ 540.432571] blkdev_ioctl+0x9cd/0x2030 [ 540.436574] ? blkpg_ioctl+0xc40/0xc40 [ 540.440501] ? lock_downgrade+0x8f0/0x8f0 [ 540.444864] ? kasan_check_read+0x11/0x20 [ 540.449029] ? rcu_is_watching+0x8c/0x150 [ 540.453193] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 540.457755] ? __fget+0x414/0x670 22:53:06 executing program 3: nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e051, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:06 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00100000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:06 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x755f4899, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 540.461236] ? expand_files.part.8+0x9c0/0x9c0 [ 540.465880] block_ioctl+0xee/0x130 [ 540.469527] ? blkdev_fallocate+0x400/0x400 [ 540.473856] do_vfs_ioctl+0x1de/0x1720 [ 540.477746] ? rcu_is_watching+0x8c/0x150 [ 540.481899] ? ioctl_preallocate+0x300/0x300 [ 540.486296] ? __fget_light+0x2f7/0x440 [ 540.490267] ? fget_raw+0x20/0x20 [ 540.493718] ? putname+0xf2/0x130 [ 540.497164] ? rcu_read_lock_sched_held+0x108/0x120 [ 540.502184] ? kmem_cache_free+0x25c/0x2d0 [ 540.506422] ? putname+0xf7/0x130 [ 540.509877] ? do_sys_open+0x3cb/0x760 [ 540.513940] ? security_file_ioctl+0x94/0xc0 [ 540.518365] ksys_ioctl+0xa9/0xd0 [ 540.521812] __x64_sys_ioctl+0x73/0xb0 [ 540.525704] do_syscall_64+0x1b9/0x820 [ 540.529593] ? finish_task_switch+0x1d3/0x870 [ 540.534089] ? syscall_return_slowpath+0x5e0/0x5e0 [ 540.539009] ? syscall_return_slowpath+0x31d/0x5e0 [ 540.543943] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 540.549309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 540.554244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.559429] RIP: 0033:0x455927 [ 540.562604] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 540.581820] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 540.589523] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 540.596785] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 540.604062] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 540.611328] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 540.618602] R13: 0000000000000000 R14: 00000000004d3c90 R15: 000000000000000b [ 540.637391] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 540.653645] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xb2, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:06 executing program 5 (fault-call:2 fault-nth:12): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x200000000000000}, 0x0) [ 541.061148] FAULT_INJECTION: forcing a failure. [ 541.061148] name failslab, interval 1, probability 0, space 0, times 0 [ 541.072506] CPU: 0 PID: 9361 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 541.079799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.089172] Call Trace: [ 541.091875] dump_stack+0x1c9/0x2b4 [ 541.095525] ? dump_stack_print_info.cold.2+0x52/0x52 [ 541.100741] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 541.105610] ? __mutex_lock+0x7e8/0x1820 [ 541.109717] should_fail.cold.4+0xa/0x1a [ 541.113816] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 541.118953] ? graph_lock+0x170/0x170 [ 541.122795] ? find_held_lock+0x36/0x1c0 [ 541.126891] ? __lock_is_held+0xb5/0x140 [ 541.130992] ? check_same_owner+0x340/0x340 [ 541.135348] ? kasan_check_write+0x14/0x20 [ 541.139612] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 541.144832] ? rcu_note_context_switch+0x730/0x730 [ 541.149807] __should_failslab+0x124/0x180 [ 541.154180] should_failslab+0x9/0x14 22:53:07 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000c0ed000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 541.158129] kmem_cache_alloc+0x2af/0x760 [ 541.162398] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 541.167454] __kernfs_new_node+0xef/0x5a0 [ 541.171633] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 541.176430] ? mutex_unlock+0xd/0x10 [ 541.180167] ? kernfs_activate+0x21a/0x2c0 [ 541.184463] ? kernfs_walk_and_get_ns+0x340/0x340 [ 541.189369] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 541.195024] ? kernfs_link_sibling+0x1d2/0x3b0 [ 541.199647] kernfs_new_node+0x80/0xf0 [ 541.203572] __kernfs_create_file+0x4d/0x330 22:53:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x63, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:07 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0xf000000}, 0x0) [ 541.208011] sysfs_add_file_mode_ns+0x21a/0x560 [ 541.212721] internal_create_group+0x282/0x970 [ 541.217341] sysfs_create_group+0x1f/0x30 [ 541.221512] lo_ioctl+0x12c8/0x1d10 [ 541.225179] ? lo_rw_aio_complete+0x450/0x450 [ 541.229724] blkdev_ioctl+0x9cd/0x2030 [ 541.233645] ? blkpg_ioctl+0xc40/0xc40 [ 541.237563] ? lock_downgrade+0x8f0/0x8f0 [ 541.241746] ? kasan_check_read+0x11/0x20 [ 541.245916] ? rcu_is_watching+0x8c/0x150 [ 541.250175] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 541.254619] ? __fget+0x414/0x670 22:53:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e044, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 541.258126] ? expand_files.part.8+0x9c0/0x9c0 [ 541.262742] block_ioctl+0xee/0x130 [ 541.266411] ? blkdev_fallocate+0x400/0x400 [ 541.270786] do_vfs_ioctl+0x1de/0x1720 [ 541.274715] ? rcu_is_watching+0x8c/0x150 [ 541.278876] ? ioctl_preallocate+0x300/0x300 [ 541.283299] ? __fget_light+0x2f7/0x440 [ 541.287291] ? fget_raw+0x20/0x20 [ 541.290761] ? putname+0xf2/0x130 [ 541.294230] ? rcu_read_lock_sched_held+0x108/0x120 [ 541.299262] ? kmem_cache_free+0x25c/0x2d0 [ 541.303518] ? putname+0xf7/0x130 [ 541.306993] ? do_sys_open+0x3cb/0x760 [ 541.310900] ? security_file_ioctl+0x94/0xc0 [ 541.315335] ksys_ioctl+0xa9/0xd0 [ 541.318808] __x64_sys_ioctl+0x73/0xb0 [ 541.322720] do_syscall_64+0x1b9/0x820 [ 541.326707] ? finish_task_switch+0x1d3/0x870 [ 541.331221] ? syscall_return_slowpath+0x5e0/0x5e0 [ 541.336174] ? syscall_return_slowpath+0x31d/0x5e0 [ 541.341132] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 541.346560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 541.351457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.356664] RIP: 0033:0x455927 [ 541.359862] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 541.379297] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 541.387041] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 541.394382] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 541.401680] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 541.408950] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 541.416221] R13: 0000000000000000 R14: 00000000004d3c90 R15: 000000000000000c [ 541.427496] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 541.445332] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:07 executing program 5 (fault-call:2 fault-nth:13): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:07 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801d1e0bab8, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:07 executing program 3: nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdddf, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:07 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0xf000}, 0x0) [ 541.843225] FAULT_INJECTION: forcing a failure. [ 541.843225] name failslab, interval 1, probability 0, space 0, times 0 [ 541.854943] CPU: 0 PID: 9410 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 541.862266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.871657] Call Trace: [ 541.874276] dump_stack+0x1c9/0x2b4 [ 541.877942] ? dump_stack_print_info.cold.2+0x52/0x52 [ 541.883155] ? __mutex_lock+0x7e8/0x1820 [ 541.887253] should_fail.cold.4+0xa/0x1a [ 541.891363] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 541.896505] ? graph_lock+0x170/0x170 [ 541.900343] ? find_held_lock+0x36/0x1c0 [ 541.904441] ? __lock_is_held+0xb5/0x140 [ 541.911014] ? check_same_owner+0x340/0x340 [ 541.915369] ? kasan_check_write+0x14/0x20 [ 541.919627] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 541.924575] ? rcu_note_context_switch+0x730/0x730 [ 541.929530] __should_failslab+0x124/0x180 [ 541.933787] should_failslab+0x9/0x14 [ 541.937612] kmem_cache_alloc+0x2af/0x760 [ 541.941895] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 541.946939] __kernfs_new_node+0xef/0x5a0 [ 541.951142] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 541.955924] ? mutex_unlock+0xd/0x10 [ 541.959666] ? kernfs_activate+0x21a/0x2c0 [ 541.963929] ? kernfs_walk_and_get_ns+0x340/0x340 [ 541.968823] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 541.974401] ? kernfs_link_sibling+0x1d2/0x3b0 [ 541.979023] kernfs_new_node+0x80/0xf0 [ 541.982952] __kernfs_create_file+0x4d/0x330 [ 541.987391] sysfs_add_file_mode_ns+0x21a/0x560 22:53:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3fffffff, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:07 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000001fffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e09d, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 541.992121] internal_create_group+0x282/0x970 [ 541.996740] sysfs_create_group+0x1f/0x30 [ 542.000909] lo_ioctl+0x12c8/0x1d10 [ 542.004561] ? lo_rw_aio_complete+0x450/0x450 [ 542.009168] blkdev_ioctl+0x9cd/0x2030 [ 542.013086] ? blkpg_ioctl+0xc40/0xc40 [ 542.016996] ? lock_downgrade+0x8f0/0x8f0 [ 542.021167] ? kasan_check_read+0x11/0x20 [ 542.025324] ? rcu_is_watching+0x8c/0x150 [ 542.029488] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 542.033915] ? __fget+0x414/0x670 [ 542.037414] ? expand_files.part.8+0x9c0/0x9c0 22:53:07 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) [ 542.042042] block_ioctl+0xee/0x130 [ 542.045686] ? blkdev_fallocate+0x400/0x400 [ 542.050026] do_vfs_ioctl+0x1de/0x1720 [ 542.053925] ? rcu_is_watching+0x8c/0x150 [ 542.058185] ? ioctl_preallocate+0x300/0x300 [ 542.062626] ? __fget_light+0x2f7/0x440 [ 542.066614] ? fget_raw+0x20/0x20 [ 542.070073] ? putname+0xf2/0x130 [ 542.073538] ? rcu_read_lock_sched_held+0x108/0x120 [ 542.078569] ? kmem_cache_free+0x25c/0x2d0 [ 542.082818] ? putname+0xf7/0x130 [ 542.086310] ? do_sys_open+0x3cb/0x760 [ 542.090238] ? security_file_ioctl+0x94/0xc0 [ 542.095022] ksys_ioctl+0xa9/0xd0 [ 542.098514] __x64_sys_ioctl+0x73/0xb0 [ 542.102449] do_syscall_64+0x1b9/0x820 [ 542.106359] ? finish_task_switch+0x1d3/0x870 [ 542.110876] ? syscall_return_slowpath+0x5e0/0x5e0 [ 542.115840] ? syscall_return_slowpath+0x31d/0x5e0 [ 542.120822] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 542.126214] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 542.131095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.136496] RIP: 0033:0x455927 [ 542.139691] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 542.158881] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 542.166600] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 542.173886] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 542.181155] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 542.188528] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 542.195802] R13: 0000000000000000 R14: 00000000004d3c90 R15: 000000000000000d [ 542.211433] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 542.240532] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:08 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x63, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:08 executing program 5 (fault-call:2 fault-nth:14): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:08 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0xffffff7f00000000}, 0x0) 22:53:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3d, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 542.590963] FAULT_INJECTION: forcing a failure. [ 542.590963] name failslab, interval 1, probability 0, space 0, times 0 [ 542.602399] CPU: 1 PID: 9454 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 542.609691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.619057] Call Trace: [ 542.621665] dump_stack+0x1c9/0x2b4 [ 542.625319] ? dump_stack_print_info.cold.2+0x52/0x52 [ 542.630531] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 542.635473] ? __mutex_lock+0x7e8/0x1820 22:53:08 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0xf0ffffffffffff}, 0x0) [ 542.639585] should_fail.cold.4+0xa/0x1a [ 542.643772] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 542.648910] ? graph_lock+0x170/0x170 [ 542.652748] ? find_held_lock+0x36/0x1c0 [ 542.656841] ? __lock_is_held+0xb5/0x140 [ 542.660934] ? check_same_owner+0x340/0x340 [ 542.665274] ? kasan_check_write+0x14/0x20 [ 542.669530] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 542.674480] ? rcu_note_context_switch+0x730/0x730 [ 542.679433] __should_failslab+0x124/0x180 [ 542.683702] should_failslab+0x9/0x14 [ 542.687521] kmem_cache_alloc+0x2af/0x760 22:53:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00004c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e00a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 542.691698] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 542.696740] __kernfs_new_node+0xef/0x5a0 [ 542.700922] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 542.705702] ? mutex_unlock+0xd/0x10 [ 542.709439] ? kernfs_activate+0x21a/0x2c0 [ 542.713698] ? kernfs_walk_and_get_ns+0x340/0x340 [ 542.718562] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 542.724123] ? kernfs_link_sibling+0x1d2/0x3b0 [ 542.728748] kernfs_new_node+0x80/0xf0 [ 542.732671] __kernfs_create_file+0x4d/0x330 [ 542.737105] sysfs_add_file_mode_ns+0x21a/0x560 [ 542.741807] internal_create_group+0x282/0x970 [ 542.746422] sysfs_create_group+0x1f/0x30 [ 542.750591] lo_ioctl+0x12c8/0x1d10 [ 542.754241] ? lo_rw_aio_complete+0x450/0x450 [ 542.758760] blkdev_ioctl+0x9cd/0x2030 [ 542.762677] ? blkpg_ioctl+0xc40/0xc40 [ 542.766680] ? lock_downgrade+0x8f0/0x8f0 [ 542.770851] ? kasan_check_read+0x11/0x20 [ 542.775039] ? rcu_is_watching+0x8c/0x150 [ 542.779181] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 542.783583] ? __fget+0x414/0x670 [ 542.787044] ? expand_files.part.8+0x9c0/0x9c0 [ 542.791621] block_ioctl+0xee/0x130 [ 542.795238] ? blkdev_fallocate+0x400/0x400 [ 542.799546] do_vfs_ioctl+0x1de/0x1720 [ 542.803429] ? rcu_is_watching+0x8c/0x150 [ 542.807577] ? ioctl_preallocate+0x300/0x300 [ 542.811975] ? __fget_light+0x2f7/0x440 [ 542.815947] ? fget_raw+0x20/0x20 [ 542.819397] ? putname+0xf2/0x130 [ 542.822841] ? rcu_read_lock_sched_held+0x108/0x120 [ 542.827859] ? kmem_cache_free+0x25c/0x2d0 [ 542.832085] ? putname+0xf7/0x130 [ 542.835527] ? do_sys_open+0x3cb/0x760 [ 542.839416] ? security_file_ioctl+0x94/0xc0 [ 542.843823] ksys_ioctl+0xa9/0xd0 [ 542.847270] __x64_sys_ioctl+0x73/0xb0 [ 542.851151] do_syscall_64+0x1b9/0x820 [ 542.855035] ? finish_task_switch+0x1d3/0x870 [ 542.859608] ? syscall_return_slowpath+0x5e0/0x5e0 [ 542.864543] ? syscall_return_slowpath+0x31d/0x5e0 [ 542.869727] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 542.875090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 542.879937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.885132] RIP: 0033:0x455927 [ 542.888302] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 542.907559] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 542.915256] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 542.922862] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 542.930125] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 22:53:08 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x9, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 542.937380] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 542.944635] R13: 0000000000000000 R14: 00000000004d3c90 R15: 000000000000000e [ 543.003532] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:08 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x300000000000000}, 0x0) [ 543.064701] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x14, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:09 executing program 5 (fault-call:2 fault-nth:15): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801cc380d58, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:09 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a001c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 543.271861] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 543.279151] BTRFS error (device loop2): superblock checksum mismatch [ 543.286586] BTRFS error (device loop2): open_ctree failed 22:53:09 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcb7, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e05a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:09 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:09 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x3000000}, 0x0) [ 543.461189] FAULT_INJECTION: forcing a failure. [ 543.461189] name failslab, interval 1, probability 0, space 0, times 0 [ 543.472589] CPU: 1 PID: 9523 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 543.479886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.489254] Call Trace: [ 543.491867] dump_stack+0x1c9/0x2b4 [ 543.495523] ? dump_stack_print_info.cold.2+0x52/0x52 [ 543.500753] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 543.505661] should_fail.cold.4+0xa/0x1a [ 543.509882] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 543.515537] ? wait_for_completion+0x8d0/0x8d0 [ 543.520151] ? graph_lock+0x170/0x170 [ 543.523978] ? graph_lock+0x170/0x170 [ 543.527800] ? kasan_check_write+0x14/0x20 [ 543.532063] ? find_held_lock+0x36/0x1c0 [ 543.536147] ? __lock_is_held+0xb5/0x140 [ 543.540238] ? check_same_owner+0x340/0x340 [ 543.544577] ? rcu_note_context_switch+0x730/0x730 [ 543.549534] __should_failslab+0x124/0x180 [ 543.553792] should_failslab+0x9/0x14 22:53:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801b6076b98, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 543.557616] kmem_cache_alloc_trace+0x2cb/0x780 [ 543.562321] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 543.567889] ? sysfs_add_file_mode_ns+0x22c/0x560 [ 543.572758] ? sysfs_add_file_mode_ns+0x23c/0x560 [ 543.577631] ? device_create_file+0x1e0/0x1e0 [ 543.582152] kobject_uevent_env+0x20f/0x1110 [ 543.586581] ? internal_create_group+0x347/0x970 [ 543.591370] kobject_uevent+0x1f/0x30 [ 543.595195] lo_ioctl+0x1346/0x1d10 [ 543.598849] ? lo_rw_aio_complete+0x450/0x450 [ 543.603459] blkdev_ioctl+0x9cd/0x2030 [ 543.608520] ? blkpg_ioctl+0xc40/0xc40 [ 543.612442] ? lock_downgrade+0x8f0/0x8f0 [ 543.616630] ? kasan_check_read+0x11/0x20 [ 543.620796] ? rcu_is_watching+0x8c/0x150 [ 543.624971] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 543.629413] ? __fget+0x414/0x670 [ 543.632904] ? expand_files.part.8+0x9c0/0x9c0 [ 543.637514] ? retint_kernel+0x10/0x10 [ 543.641424] block_ioctl+0xee/0x130 [ 543.645074] ? blkdev_fallocate+0x400/0x400 [ 543.649415] do_vfs_ioctl+0x1de/0x1720 [ 543.653319] ? rcu_is_watching+0x8c/0x150 [ 543.657496] ? ioctl_preallocate+0x300/0x300 [ 543.661923] ? __fget_light+0x2f7/0x440 [ 543.665918] ? fget_raw+0x20/0x20 [ 543.669396] ? putname+0xf2/0x130 [ 543.672862] ? rcu_read_lock_sched_held+0x108/0x120 [ 543.677892] ? kmem_cache_free+0x25c/0x2d0 [ 543.682150] ? putname+0xf7/0x130 [ 543.685620] ? do_sys_open+0x3cb/0x760 [ 543.689531] ? security_file_ioctl+0x94/0xc0 [ 543.693971] ksys_ioctl+0xa9/0xd0 [ 543.697450] __x64_sys_ioctl+0x73/0xb0 [ 543.701368] do_syscall_64+0x1b9/0x820 [ 543.705276] ? finish_task_switch+0x1d3/0x870 [ 543.709791] ? syscall_return_slowpath+0x5e0/0x5e0 [ 543.714749] ? syscall_return_slowpath+0x31d/0x5e0 [ 543.719718] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 543.725157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 543.730031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.735236] RIP: 0033:0x455927 [ 543.738473] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 543.757926] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 543.765649] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 543.772919] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 543.780176] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 543.787432] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 543.794776] R13: 0000000000000000 R14: 00000000004d3c90 R15: 000000000000000f 22:53:09 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x9effffff}, 0x0) [ 543.822816] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 543.928907] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:09 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000010000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e05c, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:09 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801c78d4038, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:09 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0xf00}, 0x0) 22:53:09 executing program 5 (fault-call:2 fault-nth:16): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 544.303847] FAULT_INJECTION: forcing a failure. [ 544.303847] name failslab, interval 1, probability 0, space 0, times 0 [ 544.315261] CPU: 0 PID: 9594 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 544.322554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.331922] Call Trace: [ 544.334528] dump_stack+0x1c9/0x2b4 [ 544.338193] ? dump_stack_print_info.cold.2+0x52/0x52 [ 544.343405] ? __kernel_text_address+0xd/0x40 [ 544.347932] should_fail.cold.4+0xa/0x1a 22:53:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc0000001, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000900004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:10 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x1000000}, 0x0) [ 544.352026] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 544.357226] ? save_stack+0xa9/0xd0 [ 544.360879] ? graph_lock+0x170/0x170 [ 544.364706] ? kasan_kmalloc+0xc4/0xe0 [ 544.368622] ? kmem_cache_alloc_trace+0x152/0x780 [ 544.373501] ? kobject_uevent_env+0x20f/0x1110 [ 544.378099] ? kobject_uevent+0x1f/0x30 [ 544.382101] ? lo_ioctl+0x1346/0x1d10 [ 544.385929] ? find_held_lock+0x36/0x1c0 [ 544.390018] ? __lock_is_held+0xb5/0x140 [ 544.394379] ? check_same_owner+0x340/0x340 [ 544.398723] ? rcu_note_context_switch+0x730/0x730 [ 544.403672] __should_failslab+0x124/0x180 [ 544.407925] should_failslab+0x9/0x14 [ 544.411744] __kmalloc+0x2c8/0x760 [ 544.415304] ? kobject_uevent_env+0x20f/0x1110 [ 544.419906] ? rcu_read_lock_sched_held+0x108/0x120 [ 544.424930] ? kobject_get_path+0xc2/0x1a0 [ 544.429162] kobject_get_path+0xc2/0x1a0 [ 544.433215] kobject_uevent_env+0x234/0x1110 [ 544.437612] ? internal_create_group+0x347/0x970 [ 544.442363] kobject_uevent+0x1f/0x30 [ 544.446162] lo_ioctl+0x1346/0x1d10 [ 544.449785] ? lo_rw_aio_complete+0x450/0x450 [ 544.454267] blkdev_ioctl+0x9cd/0x2030 [ 544.458145] ? blkpg_ioctl+0xc40/0xc40 [ 544.462029] ? lock_downgrade+0x8f0/0x8f0 [ 544.466525] ? kasan_check_read+0x11/0x20 [ 544.470658] ? rcu_is_watching+0x8c/0x150 [ 544.474821] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 544.479225] ? __fget+0x414/0x670 [ 544.482668] ? expand_files.part.8+0x9c0/0x9c0 [ 544.487244] block_ioctl+0xee/0x130 [ 544.490861] ? blkdev_fallocate+0x400/0x400 [ 544.495189] do_vfs_ioctl+0x1de/0x1720 [ 544.499071] ? rcu_is_watching+0x8c/0x150 [ 544.503228] ? ioctl_preallocate+0x300/0x300 [ 544.507625] ? __fget_light+0x2f7/0x440 [ 544.511601] ? fget_raw+0x20/0x20 [ 544.515046] ? putname+0xf2/0x130 [ 544.518493] ? rcu_read_lock_sched_held+0x108/0x120 [ 544.523513] ? kmem_cache_free+0x25c/0x2d0 [ 544.527736] ? putname+0xf7/0x130 [ 544.531178] ? do_sys_open+0x3cb/0x760 [ 544.535070] ? security_file_ioctl+0x94/0xc0 [ 544.539477] ksys_ioctl+0xa9/0xd0 [ 544.542920] __x64_sys_ioctl+0x73/0xb0 [ 544.546795] do_syscall_64+0x1b9/0x820 [ 544.550667] ? finish_task_switch+0x1d3/0x870 [ 544.555159] ? syscall_return_slowpath+0x5e0/0x5e0 [ 544.560078] ? syscall_return_slowpath+0x31d/0x5e0 [ 544.565018] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 544.570382] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 544.575221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.580408] RIP: 0033:0x455927 [ 544.583579] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 544.602856] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 544.610580] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 544.617839] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 544.625093] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 544.632360] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 544.639808] R13: 0000000000000000 R14: 00000000004d3c90 R15: 0000000000000010 22:53:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e094, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 544.655433] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 544.695680] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:10 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8300, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:10 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:10 executing program 5 (fault-call:2 fault-nth:17): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801d8fe3ab8, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:10 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xf00}, 0x0) [ 545.088082] FAULT_INJECTION: forcing a failure. [ 545.088082] name failslab, interval 1, probability 0, space 0, times 0 [ 545.099456] CPU: 1 PID: 9644 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 545.106747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.116121] Call Trace: [ 545.118730] dump_stack+0x1c9/0x2b4 [ 545.122385] ? dump_stack_print_info.cold.2+0x52/0x52 [ 545.127689] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 545.132566] should_fail.cold.4+0xa/0x1a [ 545.136661] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 545.141788] ? rcu_note_context_switch+0x730/0x730 [ 545.146827] ? graph_lock+0x170/0x170 [ 545.150673] ? find_held_lock+0x36/0x1c0 [ 545.155370] ? __lock_is_held+0xb5/0x140 [ 545.159619] ? check_same_owner+0x340/0x340 [ 545.163976] ? graph_lock+0x170/0x170 [ 545.167815] ? rcu_note_context_switch+0x730/0x730 [ 545.172786] __should_failslab+0x124/0x180 [ 545.177071] should_failslab+0x9/0x14 [ 545.180906] kmem_cache_alloc_node+0x272/0x780 [ 545.185514] ? find_held_lock+0x36/0x1c0 [ 545.189626] __alloc_skb+0x119/0x790 [ 545.193390] ? skb_scrub_packet+0x580/0x580 [ 545.197744] ? kasan_check_read+0x11/0x20 [ 545.201915] ? rcu_is_watching+0x8c/0x150 [ 545.206186] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 545.210640] ? netlink_has_listeners+0x2da/0x4c0 [ 545.215424] ? netlink_tap_init_net+0x3e0/0x3e0 [ 545.220119] alloc_uevent_skb+0x89/0x220 [ 545.224257] kobject_uevent_env+0x866/0x1110 [ 545.228684] ? internal_create_group+0x347/0x970 [ 545.233467] kobject_uevent+0x1f/0x30 22:53:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e02f, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:11 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000800004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:11 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 545.237287] lo_ioctl+0x1346/0x1d10 [ 545.240942] ? lo_rw_aio_complete+0x450/0x450 [ 545.245456] blkdev_ioctl+0x9cd/0x2030 [ 545.249365] ? blkpg_ioctl+0xc40/0xc40 [ 545.253320] ? lock_downgrade+0x8f0/0x8f0 [ 545.257492] ? kasan_check_read+0x11/0x20 [ 545.261655] ? rcu_is_watching+0x8c/0x150 [ 545.265811] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 545.270243] ? __fget+0x414/0x670 [ 545.273721] ? expand_files.part.8+0x9c0/0x9c0 [ 545.278328] block_ioctl+0xee/0x130 [ 545.281975] ? blkdev_fallocate+0x400/0x400 [ 545.286311] do_vfs_ioctl+0x1de/0x1720 [ 545.290213] ? rcu_is_watching+0x8c/0x150 [ 545.294389] ? ioctl_preallocate+0x300/0x300 [ 545.298817] ? __fget_light+0x2f7/0x440 [ 545.302843] ? fget_raw+0x20/0x20 [ 545.307021] ? putname+0xf2/0x130 [ 545.310504] ? rcu_read_lock_sched_held+0x108/0x120 [ 545.315640] ? kmem_cache_free+0x25c/0x2d0 [ 545.319991] ? putname+0xf7/0x130 [ 545.323559] ? do_sys_open+0x3cb/0x760 [ 545.327483] ? security_file_ioctl+0x94/0xc0 [ 545.332529] ksys_ioctl+0xa9/0xd0 22:53:11 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x400300}, 0x0) [ 545.336019] __x64_sys_ioctl+0x73/0xb0 [ 545.339951] do_syscall_64+0x1b9/0x820 [ 545.343854] ? finish_task_switch+0x1d3/0x870 [ 545.348373] ? syscall_return_slowpath+0x5e0/0x5e0 [ 545.353341] ? syscall_return_slowpath+0x31d/0x5e0 [ 545.358309] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 545.363702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 545.368585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.373907] RIP: 0033:0x455927 [ 545.377099] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 545.396706] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 545.404418] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 545.411785] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 545.419066] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 545.426346] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 545.433623] R13: 0000000000000000 R14: 00000000004d3c90 R15: 0000000000000011 [ 545.442311] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 545.495107] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x41c, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:11 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x3000000}, 0x0) 22:53:11 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801d2fd0818, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:11 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000030000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:11 executing program 5 (fault-call:2 fault-nth:18): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xddda, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e058, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:11 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xf000000}, 0x0) [ 545.910016] FAULT_INJECTION: forcing a failure. [ 545.910016] name failslab, interval 1, probability 0, space 0, times 0 [ 545.921842] CPU: 1 PID: 9706 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 545.929129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.938583] Call Trace: [ 545.941202] dump_stack+0x1c9/0x2b4 [ 545.944868] ? dump_stack_print_info.cold.2+0x52/0x52 [ 545.950085] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 545.954956] ? __kernel_text_address+0xd/0x40 [ 545.959481] should_fail.cold.4+0xa/0x1a [ 545.963572] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 545.968703] ? save_stack+0xa9/0xd0 [ 545.972351] ? graph_lock+0x170/0x170 [ 545.976171] ? kasan_kmalloc+0xc4/0xe0 [ 545.980895] ? kmem_cache_alloc_trace+0x152/0x780 [ 545.986018] ? kobject_uevent_env+0x20f/0x1110 [ 545.990622] ? kobject_uevent+0x1f/0x30 [ 545.994631] ? find_held_lock+0x36/0x1c0 [ 545.998726] ? __lock_is_held+0xb5/0x140 [ 546.002827] ? check_same_owner+0x340/0x340 [ 546.007174] ? do_raw_spin_unlock+0xa7/0x2f0 [ 546.011607] ? rcu_note_context_switch+0x730/0x730 [ 546.016571] __should_failslab+0x124/0x180 [ 546.020839] should_failslab+0x9/0x14 [ 546.024664] __kmalloc+0x2c8/0x760 [ 546.028235] ? kobject_uevent_env+0x20f/0x1110 [ 546.032847] ? rcu_read_lock_sched_held+0x108/0x120 [ 546.037983] ? kobject_get_path+0xc2/0x1a0 [ 546.042251] kobject_get_path+0xc2/0x1a0 [ 546.046341] kobject_uevent_env+0x234/0x1110 [ 546.050772] ? internal_create_group+0x347/0x970 [ 546.055567] kobject_uevent+0x1f/0x30 22:53:11 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xea1c, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 546.059391] lo_ioctl+0x1346/0x1d10 [ 546.063047] ? lo_rw_aio_complete+0x450/0x450 [ 546.067565] blkdev_ioctl+0x9cd/0x2030 [ 546.071477] ? blkpg_ioctl+0xc40/0xc40 [ 546.075389] ? lock_downgrade+0x8f0/0x8f0 [ 546.079564] ? kasan_check_read+0x11/0x20 [ 546.083731] ? rcu_is_watching+0x8c/0x150 [ 546.087903] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 546.092340] ? __fget+0x414/0x670 [ 546.095820] ? expand_files.part.8+0x9c0/0x9c0 [ 546.100430] block_ioctl+0xee/0x130 [ 546.104090] ? blkdev_fallocate+0x400/0x400 [ 546.108472] do_vfs_ioctl+0x1de/0x1720 [ 546.112698] ? rcu_is_watching+0x8c/0x150 [ 546.116882] ? ioctl_preallocate+0x300/0x300 [ 546.121322] ? __fget_light+0x2f7/0x440 [ 546.125320] ? fget_raw+0x20/0x20 [ 546.128803] ? putname+0xf2/0x130 [ 546.132296] ? rcu_read_lock_sched_held+0x108/0x120 [ 546.137339] ? kmem_cache_free+0x25c/0x2d0 [ 546.141600] ? putname+0xf7/0x130 [ 546.145077] ? do_sys_open+0x3cb/0x760 [ 546.148996] ? security_file_ioctl+0x94/0xc0 [ 546.153437] ksys_ioctl+0xa9/0xd0 [ 546.156927] __x64_sys_ioctl+0x73/0xb0 [ 546.160847] do_syscall_64+0x1b9/0x820 [ 546.164753] ? finish_task_switch+0x1d3/0x870 [ 546.169273] ? syscall_return_slowpath+0x5e0/0x5e0 [ 546.174236] ? syscall_return_slowpath+0x31d/0x5e0 [ 546.179284] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 546.184694] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 546.189571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 546.194778] RIP: 0033:0x455927 22:53:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e003, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 546.197971] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 546.217470] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 546.225217] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 546.232510] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 546.239821] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 546.247196] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 546.254484] R13: 0000000000000000 R14: 00000000004d3c90 R15: 0000000000000012 22:53:12 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x300}, 0x0) [ 546.310771] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:12 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00fffffff40000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:12 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801ce72eb98, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 546.371213] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:12 executing program 5 (fault-call:2 fault-nth:19): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:12 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xf}, 0x0) 22:53:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdde4, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e06f, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:12 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000fff00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 546.672176] FAULT_INJECTION: forcing a failure. [ 546.672176] name failslab, interval 1, probability 0, space 0, times 0 [ 546.683528] CPU: 1 PID: 9760 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 546.690825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.700191] Call Trace: [ 546.702805] dump_stack+0x1c9/0x2b4 [ 546.706468] ? dump_stack_print_info.cold.2+0x52/0x52 [ 546.711680] ? kernel_text_address+0x79/0xf0 [ 546.716122] should_fail.cold.4+0xa/0x1a [ 546.720204] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 546.725338] ? graph_lock+0x170/0x170 [ 546.729165] ? save_stack+0x43/0xd0 [ 546.732811] ? kasan_kmalloc+0xc4/0xe0 [ 546.736718] ? find_held_lock+0x36/0x1c0 [ 546.740806] ? __lock_is_held+0xb5/0x140 [ 546.744901] ? check_same_owner+0x340/0x340 [ 546.749253] ? rcu_note_context_switch+0x730/0x730 [ 546.754194] __should_failslab+0x124/0x180 [ 546.758525] should_failslab+0x9/0x14 [ 546.762337] kmem_cache_alloc_node_trace+0x26f/0x770 [ 546.767722] __kmalloc_node_track_caller+0x33/0x70 [ 546.772665] __kmalloc_reserve.isra.40+0x3a/0xe0 [ 546.777469] __alloc_skb+0x155/0x790 [ 546.781185] ? skb_scrub_packet+0x580/0x580 [ 546.785501] ? kasan_check_read+0x11/0x20 [ 546.789642] ? rcu_is_watching+0x8c/0x150 [ 546.793783] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 546.798193] ? netlink_has_listeners+0x2da/0x4c0 [ 546.802944] ? netlink_tap_init_net+0x3e0/0x3e0 [ 546.807619] alloc_uevent_skb+0x89/0x220 [ 546.811674] kobject_uevent_env+0x866/0x1110 [ 546.816075] ? internal_create_group+0x347/0x970 [ 546.820851] kobject_uevent+0x1f/0x30 [ 546.824647] lo_ioctl+0x1346/0x1d10 [ 546.828286] ? lo_rw_aio_complete+0x450/0x450 [ 546.832777] blkdev_ioctl+0x9cd/0x2030 [ 546.836669] ? blkpg_ioctl+0xc40/0xc40 [ 546.840563] ? lock_downgrade+0x8f0/0x8f0 [ 546.844707] ? kasan_check_read+0x11/0x20 [ 546.848853] ? rcu_is_watching+0x8c/0x150 [ 546.852994] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 546.857403] ? __fget+0x414/0x670 [ 546.860853] ? expand_files.part.8+0x9c0/0x9c0 [ 546.865447] block_ioctl+0xee/0x130 [ 546.869065] ? blkdev_fallocate+0x400/0x400 [ 546.873373] do_vfs_ioctl+0x1de/0x1720 [ 546.877244] ? rcu_is_watching+0x8c/0x150 [ 546.881382] ? ioctl_preallocate+0x300/0x300 [ 546.885779] ? __fget_light+0x2f7/0x440 [ 546.889742] ? fget_raw+0x20/0x20 [ 546.893217] ? putname+0xf2/0x130 [ 546.896665] ? rcu_read_lock_sched_held+0x108/0x120 [ 546.901671] ? kmem_cache_free+0x25c/0x2d0 [ 546.905898] ? putname+0xf7/0x130 [ 546.909354] ? do_sys_open+0x3cb/0x760 [ 546.913238] ? security_file_ioctl+0x94/0xc0 [ 546.917640] ksys_ioctl+0xa9/0xd0 [ 546.921087] __x64_sys_ioctl+0x73/0xb0 [ 546.924968] do_syscall_64+0x1b9/0x820 [ 546.928855] ? finish_task_switch+0x1d3/0x870 [ 546.933360] ? syscall_return_slowpath+0x5e0/0x5e0 [ 546.938290] ? syscall_return_slowpath+0x31d/0x5e0 [ 546.943226] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 546.948591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 546.953445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 546.958630] RIP: 0033:0x455927 [ 546.961804] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 546.981242] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 546.988959] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 546.996216] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 547.003481] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 547.010746] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 547.018022] R13: 0000000000000000 R14: 00000000004d3c90 R15: 0000000000000013 [ 547.036481] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:12 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7e01, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:12 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x40030000000000}, 0x0) 22:53:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3d, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 547.196418] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:13 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00ffffffffffffff7f00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:13 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:13 executing program 5 (fault-call:2 fault-nth:20): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e008, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x300000000000000}, 0x0) 22:53:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6800, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8300, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:13 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcb6, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 547.604793] FAULT_INJECTION: forcing a failure. [ 547.604793] name failslab, interval 1, probability 0, space 0, times 0 [ 547.616545] CPU: 0 PID: 9832 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 547.623855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.633236] Call Trace: [ 547.635845] dump_stack+0x1c9/0x2b4 [ 547.639495] ? dump_stack_print_info.cold.2+0x52/0x52 [ 547.644727] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 547.649599] should_fail.cold.4+0xa/0x1a 22:53:13 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00f5ffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x9effffff00000000}, 0x0) [ 547.653694] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 547.659135] ? is_bpf_text_address+0xd7/0x170 [ 547.663653] ? graph_lock+0x170/0x170 [ 547.667448] ? __kernel_text_address+0xd/0x40 [ 547.671949] ? find_held_lock+0x36/0x1c0 [ 547.676022] ? __lock_is_held+0xb5/0x140 [ 547.680092] ? check_same_owner+0x340/0x340 [ 547.684402] ? blkdev_ioctl+0x9cd/0x2030 [ 547.688457] ? block_ioctl+0xee/0x130 [ 547.692259] ? do_vfs_ioctl+0x1de/0x1720 [ 547.696313] ? rcu_note_context_switch+0x730/0x730 [ 547.701230] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.706597] __should_failslab+0x124/0x180 [ 547.710829] should_failslab+0x9/0x14 [ 547.714636] kmem_cache_alloc+0x2af/0x760 [ 547.718792] skb_clone+0x1f5/0x500 [ 547.722335] ? refcount_add_not_zero+0x2d0/0x330 [ 547.727102] ? skb_split+0x11f0/0x11f0 [ 547.730987] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 547.735998] ? netlink_trim+0x1ba/0x380 [ 547.739976] ? netlink_skb_destructor+0x210/0x210 [ 547.744848] netlink_broadcast_filtered+0x10bc/0x1630 [ 547.750052] ? __netlink_sendskb+0xd0/0xd0 [ 547.754288] ? kasan_check_read+0x11/0x20 [ 547.758425] ? rcu_is_watching+0x8c/0x150 [ 547.762581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.768119] ? refcount_inc_not_zero+0x1e5/0x2f0 [ 547.772882] ? refcount_add_not_zero+0x330/0x330 [ 547.777634] ? netlink_has_listeners+0x2da/0x4c0 [ 547.782380] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 547.787406] netlink_broadcast+0x3a/0x50 [ 547.791457] kobject_uevent_env+0x829/0x1110 [ 547.795856] ? internal_create_group+0x347/0x970 [ 547.800606] kobject_uevent+0x1f/0x30 [ 547.804403] lo_ioctl+0x1346/0x1d10 [ 547.808060] ? lo_rw_aio_complete+0x450/0x450 [ 547.812552] blkdev_ioctl+0x9cd/0x2030 [ 547.816444] ? blkpg_ioctl+0xc40/0xc40 [ 547.820335] ? lock_downgrade+0x8f0/0x8f0 [ 547.824485] ? kasan_check_read+0x11/0x20 [ 547.828616] ? rcu_is_watching+0x8c/0x150 [ 547.832761] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 547.837164] ? __fget+0x414/0x670 [ 547.840615] ? expand_files.part.8+0x9c0/0x9c0 [ 547.845191] block_ioctl+0xee/0x130 [ 547.848805] ? blkdev_fallocate+0x400/0x400 [ 547.853117] do_vfs_ioctl+0x1de/0x1720 [ 547.856996] ? rcu_is_watching+0x8c/0x150 [ 547.861156] ? ioctl_preallocate+0x300/0x300 [ 547.865569] ? __fget_light+0x2f7/0x440 [ 547.869539] ? fget_raw+0x20/0x20 [ 547.872974] ? putname+0xf2/0x130 [ 547.876416] ? rcu_read_lock_sched_held+0x108/0x120 [ 547.881417] ? kmem_cache_free+0x25c/0x2d0 [ 547.885646] ? putname+0xf7/0x130 [ 547.889094] ? do_sys_open+0x3cb/0x760 [ 547.892988] ? security_file_ioctl+0x94/0xc0 [ 547.897402] ksys_ioctl+0xa9/0xd0 [ 547.900854] __x64_sys_ioctl+0x73/0xb0 [ 547.904735] do_syscall_64+0x1b9/0x820 [ 547.908625] ? finish_task_switch+0x1d3/0x870 [ 547.913110] ? syscall_return_slowpath+0x5e0/0x5e0 [ 547.918049] ? syscall_return_slowpath+0x31d/0x5e0 [ 547.922984] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 547.928353] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 547.933189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.938364] RIP: 0033:0x455927 [ 547.941533] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 547.960756] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 547.968469] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000455927 [ 547.975727] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 547.982989] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 547.990266] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 547.997535] R13: 0000000000000000 R14: 00000000004d3c90 R15: 0000000000000014 [ 548.009322] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 548.024282] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:13 executing program 5 (fault-call:2 fault-nth:21): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e091, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da2363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:14 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000001c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 548.360325] FAULT_INJECTION: forcing a failure. [ 548.360325] name failslab, interval 1, probability 0, space 0, times 0 [ 548.371657] CPU: 1 PID: 9855 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 548.378943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.388307] Call Trace: [ 548.390922] dump_stack+0x1c9/0x2b4 [ 548.394580] ? dump_stack_print_info.cold.2+0x52/0x52 [ 548.399883] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 548.404765] should_fail.cold.4+0xa/0x1a [ 548.408856] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 548.413992] ? lock_downgrade+0x8f0/0x8f0 [ 548.418175] ? kasan_check_read+0x11/0x20 [ 548.422350] ? rcu_is_watching+0x8c/0x150 [ 548.426620] ? find_held_lock+0x36/0x1c0 [ 548.430718] ? check_same_owner+0x340/0x340 [ 548.435335] ? block_ioctl+0xee/0x130 [ 548.439145] ? rcu_note_context_switch+0x730/0x730 [ 548.444092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.449650] __should_failslab+0x124/0x180 [ 548.453901] should_failslab+0x9/0x14 [ 548.457712] kmem_cache_alloc+0x2af/0x760 [ 548.461886] ? fget_raw+0x20/0x20 [ 548.465392] ? putname+0xf2/0x130 [ 548.468882] ? rcu_read_lock_sched_held+0x108/0x120 [ 548.473926] getname_flags+0xd0/0x5a0 [ 548.477749] do_mkdirat+0xc5/0x310 [ 548.481323] ? __ia32_sys_mknod+0xb0/0xb0 [ 548.485491] ? fput+0x130/0x1a0 [ 548.488796] ? ksys_ioctl+0x81/0xd0 [ 548.492457] __x64_sys_mkdir+0x5c/0x80 [ 548.496373] do_syscall_64+0x1b9/0x820 [ 548.500285] ? finish_task_switch+0x1d3/0x870 [ 548.504815] ? syscall_return_slowpath+0x5e0/0x5e0 [ 548.509774] ? syscall_return_slowpath+0x31d/0x5e0 [ 548.514746] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 548.520154] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 548.525041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.530250] RIP: 0033:0x454ef7 [ 548.533453] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 548.552893] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 22:53:14 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x4506000000000000}, 0x0) [ 548.560623] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000454ef7 [ 548.567902] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 00000000200001c0 [ 548.575184] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 548.582465] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 548.589754] R13: 0000000000000000 R14: 00000000004d3c90 R15: 0000000000000015 [ 548.599211] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:14 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) [ 548.612679] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 548.648148] print_req_error: I/O error, dev loop2, sector 128 22:53:14 executing program 5 (fault-call:2 fault-nth:22): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:14 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 22:53:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xea1d, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:14 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000006c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:14 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcba, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4233a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e054, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:14 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) [ 549.054415] FAULT_INJECTION: forcing a failure. [ 549.054415] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 549.066315] CPU: 1 PID: 9894 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 549.073579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.082920] Call Trace: [ 549.085509] dump_stack+0x1c9/0x2b4 [ 549.089146] ? dump_stack_print_info.cold.2+0x52/0x52 [ 549.094332] ? debug_check_no_obj_freed+0x30b/0x595 [ 549.099368] should_fail.cold.4+0xa/0x1a [ 549.103424] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 549.108529] ? kfree+0x111/0x260 [ 549.111892] ? trace_hardirqs_on+0x10/0x10 [ 549.116208] ? kobject_uevent_env+0x288/0x1110 [ 549.120779] ? internal_create_group+0x347/0x970 [ 549.125536] ? mutex_unlock+0xd/0x10 [ 549.129269] ? lo_ioctl+0xe8/0x1d10 [ 549.132895] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 549.137733] ? lo_rw_aio_complete+0x450/0x450 [ 549.142225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.147768] ? should_fail+0x223/0xbed [ 549.151662] ? blkpg_ioctl+0xc40/0xc40 [ 549.155545] __alloc_pages_nodemask+0x36e/0xdb0 [ 549.160212] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 549.165227] ? find_held_lock+0x36/0x1c0 [ 549.169299] ? check_same_owner+0x340/0x340 [ 549.173630] cache_grow_begin+0x91/0x710 [ 549.177697] kmem_cache_alloc+0x689/0x760 [ 549.181845] ? fget_raw+0x20/0x20 [ 549.185296] ? putname+0xf2/0x130 [ 549.188759] getname_flags+0xd0/0x5a0 [ 549.192553] do_mkdirat+0xc5/0x310 [ 549.196096] ? __ia32_sys_mknod+0xb0/0xb0 [ 549.200233] ? fput+0x130/0x1a0 [ 549.203512] ? ksys_ioctl+0x81/0xd0 [ 549.207134] __x64_sys_mkdir+0x5c/0x80 [ 549.211017] do_syscall_64+0x1b9/0x820 [ 549.214901] ? finish_task_switch+0x1d3/0x870 [ 549.219386] ? syscall_return_slowpath+0x5e0/0x5e0 [ 549.224321] ? syscall_return_slowpath+0x31d/0x5e0 [ 549.229425] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 549.234801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 549.239652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.244829] RIP: 0033:0x454ef7 [ 549.248015] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.267288] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 549.274985] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000454ef7 [ 549.282250] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 00000000200001c0 [ 549.289510] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 549.297129] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 22:53:15 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xf0ffffff}, 0x0) [ 549.304391] R13: 0000000000000000 R14: 00000000004d3c90 R15: 0000000000000016 [ 549.332657] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:15 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a007fffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 549.347844] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da42b3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:15 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcb2, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1400, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e073, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:15 executing program 5 (fault-call:2 fault-nth:23): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 549.614689] FAULT_INJECTION: forcing a failure. [ 549.614689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 549.626552] CPU: 1 PID: 9913 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 549.633843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.643200] Call Trace: [ 549.645816] dump_stack+0x1c9/0x2b4 [ 549.649454] ? dump_stack_print_info.cold.2+0x52/0x52 [ 549.654652] ? debug_check_no_obj_freed+0x30b/0x595 [ 549.659717] should_fail.cold.4+0xa/0x1a [ 549.663788] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 549.668907] ? kfree+0x111/0x260 [ 549.672283] ? trace_hardirqs_on+0x10/0x10 [ 549.676521] ? kobject_uevent_env+0x288/0x1110 [ 549.681113] ? internal_create_group+0x347/0x970 [ 549.685894] ? mutex_unlock+0xd/0x10 [ 549.689630] ? lo_ioctl+0xe8/0x1d10 [ 549.693271] ? lo_rw_aio_complete+0x450/0x450 [ 549.697782] ? blkdev_ioctl+0x161/0x2030 [ 549.701862] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.707405] ? should_fail+0x223/0xbed [ 549.711301] ? blkpg_ioctl+0xc40/0xc40 [ 549.715197] __alloc_pages_nodemask+0x36e/0xdb0 [ 549.719881] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 549.724915] ? find_held_lock+0x36/0x1c0 [ 549.728993] ? check_same_owner+0x340/0x340 [ 549.733314] cache_grow_begin+0x91/0x710 [ 549.737377] kmem_cache_alloc+0x689/0x760 [ 549.741532] ? fget_raw+0x20/0x20 [ 549.744976] ? putname+0xf2/0x130 [ 549.748440] getname_flags+0xd0/0x5a0 [ 549.752242] do_mkdirat+0xc5/0x310 [ 549.755773] ? __ia32_sys_mknod+0xb0/0xb0 [ 549.760024] ? fput+0x130/0x1a0 [ 549.763309] ? ksys_ioctl+0x81/0xd0 [ 549.767040] __x64_sys_mkdir+0x5c/0x80 [ 549.770923] do_syscall_64+0x1b9/0x820 [ 549.774820] ? finish_task_switch+0x1d3/0x870 [ 549.779313] ? syscall_return_slowpath+0x5e0/0x5e0 [ 549.784233] ? syscall_return_slowpath+0x31d/0x5e0 [ 549.789153] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 549.794523] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 549.799361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.804537] RIP: 0033:0x454ef7 [ 549.807707] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.827037] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 549.834735] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000454ef7 [ 549.841989] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 00000000200001c0 [ 549.849248] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 549.856503] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 22:53:15 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xf000}, 0x0) 22:53:15 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:15 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000feffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 549.863756] R13: 0000000000000000 R14: 00000000004d3c90 R15: 0000000000000017 [ 549.877226] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 549.892811] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:15 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4f, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da42d3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:15 executing program 5 (fault-call:2 fault-nth:24): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e08e, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:15 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x100000000000000}, 0x0) 22:53:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8fa4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 550.254996] FAULT_INJECTION: forcing a failure. [ 550.254996] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 550.266862] CPU: 0 PID: 9943 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 550.274136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.283541] Call Trace: [ 550.286132] dump_stack+0x1c9/0x2b4 [ 550.289750] ? dump_stack_print_info.cold.2+0x52/0x52 [ 550.294929] ? debug_check_no_obj_freed+0x30b/0x595 [ 550.299939] should_fail.cold.4+0xa/0x1a [ 550.303989] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 550.309091] ? kfree+0x111/0x260 [ 550.312455] ? trace_hardirqs_on+0x10/0x10 [ 550.316680] ? kobject_uevent_env+0x288/0x1110 [ 550.321249] ? internal_create_group+0x347/0x970 [ 550.326096] ? mutex_unlock+0xd/0x10 [ 550.329799] ? lo_ioctl+0xe8/0x1d10 [ 550.333419] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 550.338257] ? lo_rw_aio_complete+0x450/0x450 [ 550.342746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 550.348271] ? should_fail+0x223/0xbed [ 550.352146] ? blkpg_ioctl+0xc40/0xc40 [ 550.356030] __alloc_pages_nodemask+0x36e/0xdb0 [ 550.360702] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 550.365715] ? find_held_lock+0x36/0x1c0 [ 550.369781] ? check_same_owner+0x340/0x340 [ 550.374103] cache_grow_begin+0x91/0x710 [ 550.378165] kmem_cache_alloc+0x689/0x760 [ 550.382410] ? fget_raw+0x20/0x20 [ 550.385851] ? putname+0xf2/0x130 [ 550.389296] getname_flags+0xd0/0x5a0 [ 550.393086] do_mkdirat+0xc5/0x310 [ 550.396617] ? __ia32_sys_mknod+0xb0/0xb0 [ 550.400756] ? fput+0x130/0x1a0 [ 550.404046] ? ksys_ioctl+0x81/0xd0 [ 550.407674] __x64_sys_mkdir+0x5c/0x80 [ 550.411552] do_syscall_64+0x1b9/0x820 [ 550.415430] ? finish_task_switch+0x1d3/0x870 [ 550.419916] ? syscall_return_slowpath+0x5e0/0x5e0 [ 550.424833] ? syscall_return_slowpath+0x31d/0x5e0 [ 550.429755] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 550.435116] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 550.439959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.445143] RIP: 0033:0x454ef7 [ 550.448321] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 550.467583] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 550.475370] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000454ef7 [ 550.482628] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 00000000200001c0 [ 550.489896] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 550.497161] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 22:53:16 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00040000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:16 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4303a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 550.504430] R13: 0000000000000000 R14: 00000000004d3c90 R15: 0000000000000018 [ 550.514136] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 550.531440] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:16 executing program 5 (fault-call:2 fault-nth:25): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:16 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 22:53:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da40a3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 550.899235] FAULT_INJECTION: forcing a failure. [ 550.899235] name failslab, interval 1, probability 0, space 0, times 0 [ 550.910623] CPU: 0 PID: 9964 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 550.917917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.927631] Call Trace: [ 550.930245] dump_stack+0x1c9/0x2b4 [ 550.933899] ? dump_stack_print_info.cold.2+0x52/0x52 [ 550.939116] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 550.943984] ? find_held_lock+0x36/0x1c0 [ 550.948075] should_fail.cold.4+0xa/0x1a [ 550.952165] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 550.957288] ? kasan_check_read+0x11/0x20 [ 550.961537] ? rcu_is_watching+0x8c/0x150 [ 550.965698] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 550.970321] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 550.974749] ? find_held_lock+0x36/0x1c0 [ 550.978843] ? check_same_owner+0x340/0x340 [ 550.983197] ? rcu_note_context_switch+0x730/0x730 [ 550.988137] ? save_stack+0xa9/0xd0 [ 550.991777] __should_failslab+0x124/0x180 [ 550.996032] should_failslab+0x9/0x14 [ 550.999846] kmem_cache_alloc+0x2af/0x760 [ 551.004010] getname_flags+0xd0/0x5a0 [ 551.007823] user_path_at_empty+0x2d/0x50 [ 551.011983] do_mount+0x17a/0x30e0 [ 551.015542] ? copy_mount_string+0x40/0x40 [ 551.019790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 551.024567] ? retint_kernel+0x10/0x10 [ 551.028480] ? copy_mount_options+0x213/0x380 [ 551.032991] ? __sanitizer_cov_trace_const_cmp4+0x11/0x20 [ 551.038547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 551.044101] ? copy_mount_options+0x285/0x380 [ 551.048624] ksys_mount+0x12d/0x140 [ 551.052268] __x64_sys_mount+0xbe/0x150 [ 551.056259] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 551.061291] do_syscall_64+0x1b9/0x820 [ 551.065198] ? finish_task_switch+0x1d3/0x870 [ 551.069705] ? syscall_return_slowpath+0x5e0/0x5e0 [ 551.074645] ? syscall_return_slowpath+0x31d/0x5e0 [ 551.079681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 551.085229] ? retint_user+0x18/0x18 [ 551.088965] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 551.093831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.099027] RIP: 0033:0x4584ea [ 551.102232] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 551.121669] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 551.129392] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 00000000004584ea [ 551.136668] RDX: 00007f4dd57adad0 RSI: 00000000200001c0 RDI: 00007f4dd57adaf0 22:53:16 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) [ 551.143944] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 551.151220] R10: 0000000000000030 R11: 0000000000000206 R12: 0000000000000014 [ 551.159796] R13: 0000000000000030 R14: 00000000004d3c90 R15: 0000000000000019 22:53:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da43d3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:17 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a004c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:17 executing program 5 (fault-call:2 fault-nth:26): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:17 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x14, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e09b, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:17 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xf0}, 0x0) 22:53:17 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da42d3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:17 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcb0, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 551.509908] FAULT_INJECTION: forcing a failure. [ 551.509908] name failslab, interval 1, probability 0, space 0, times 0 [ 551.521356] CPU: 0 PID: 9995 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 551.528646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.538174] Call Trace: [ 551.540774] dump_stack+0x1c9/0x2b4 [ 551.544427] ? dump_stack_print_info.cold.2+0x52/0x52 [ 551.549638] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 551.554498] ? find_held_lock+0x36/0x1c0 22:53:17 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000001000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 551.558593] should_fail.cold.4+0xa/0x1a [ 551.562683] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 551.567805] ? kasan_check_read+0x11/0x20 [ 551.571981] ? rcu_is_watching+0x8c/0x150 [ 551.576140] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 551.580560] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 551.585170] ? find_held_lock+0x36/0x1c0 [ 551.589256] ? check_same_owner+0x340/0x340 [ 551.593585] ? rcu_note_context_switch+0x730/0x730 [ 551.598519] ? save_stack+0xa9/0xd0 [ 551.602162] __should_failslab+0x124/0x180 [ 551.606438] should_failslab+0x9/0x14 [ 551.610247] kmem_cache_alloc+0x2af/0x760 [ 551.614408] ? find_held_lock+0x36/0x1c0 [ 551.618482] getname_flags+0xd0/0x5a0 [ 551.622379] user_path_at_empty+0x2d/0x50 [ 551.626543] do_mount+0x17a/0x30e0 [ 551.630092] ? do_raw_spin_unlock+0xa7/0x2f0 [ 551.634514] ? copy_mount_string+0x40/0x40 [ 551.638759] ? rcu_pm_notify+0xc0/0xc0 [ 551.642665] ? copy_mount_options+0x5f/0x380 [ 551.647080] ? rcu_read_lock_sched_held+0x108/0x120 [ 551.652103] ? kmem_cache_alloc_trace+0x616/0x780 [ 551.656991] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 551.662551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 551.668104] ? copy_mount_options+0x285/0x380 [ 551.672709] ksys_mount+0x12d/0x140 [ 551.676350] __x64_sys_mount+0xbe/0x150 [ 551.680335] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 551.685364] do_syscall_64+0x1b9/0x820 [ 551.689263] ? finish_task_switch+0x1d3/0x870 [ 551.693766] ? syscall_return_slowpath+0x5e0/0x5e0 [ 551.698704] ? syscall_return_slowpath+0x31d/0x5e0 [ 551.703821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 551.709370] ? retint_user+0x18/0x18 [ 551.713103] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 551.717966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.723159] RIP: 0033:0x4584ea [ 551.726344] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 551.745882] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 551.753604] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 00000000004584ea [ 551.760876] RDX: 00007f4dd57adad0 RSI: 00000000200001c0 RDI: 00007f4dd57adaf0 [ 551.768168] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 551.775450] R10: 0000000000000030 R11: 0000000000000206 R12: 0000000000000014 [ 551.782726] R13: 0000000000000030 R14: 00000000004d3c90 R15: 000000000000001a 22:53:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4483a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:17 executing program 5 (fault-call:2 fault-nth:27): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:17 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x645}, 0x0) 22:53:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4483a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e066, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:17 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00007a00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:18 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x2000000}, 0x0) [ 552.162699] FAULT_INJECTION: forcing a failure. [ 552.162699] name failslab, interval 1, probability 0, space 0, times 0 [ 552.174158] CPU: 0 PID: 10021 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 552.181570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.190969] Call Trace: [ 552.193577] dump_stack+0x1c9/0x2b4 [ 552.197225] ? dump_stack_print_info.cold.2+0x52/0x52 [ 552.202432] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 552.207289] ? find_held_lock+0x36/0x1c0 [ 552.211373] should_fail.cold.4+0xa/0x1a [ 552.215452] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 552.220599] ? kasan_check_read+0x11/0x20 [ 552.224762] ? rcu_is_watching+0x8c/0x150 [ 552.228942] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 552.233371] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 552.237808] ? find_held_lock+0x36/0x1c0 [ 552.241910] ? check_same_owner+0x340/0x340 [ 552.246338] ? rcu_note_context_switch+0x730/0x730 [ 552.251281] ? save_stack+0xa9/0xd0 [ 552.254932] __should_failslab+0x124/0x180 [ 552.259179] should_failslab+0x9/0x14 [ 552.262989] kmem_cache_alloc+0x2af/0x760 [ 552.267150] ? find_held_lock+0x36/0x1c0 [ 552.271231] getname_flags+0xd0/0x5a0 [ 552.275047] user_path_at_empty+0x2d/0x50 [ 552.279227] do_mount+0x17a/0x30e0 [ 552.282774] ? do_raw_spin_unlock+0xa7/0x2f0 [ 552.287196] ? copy_mount_string+0x40/0x40 [ 552.291445] ? rcu_pm_notify+0xc0/0xc0 [ 552.295369] ? copy_mount_options+0x5f/0x380 [ 552.299792] ? rcu_read_lock_sched_held+0x108/0x120 [ 552.305349] ? kmem_cache_alloc_trace+0x616/0x780 [ 552.310217] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 552.315791] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.321352] ? copy_mount_options+0x285/0x380 [ 552.325869] ksys_mount+0x12d/0x140 [ 552.329522] __x64_sys_mount+0xbe/0x150 [ 552.333519] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 552.338576] do_syscall_64+0x1b9/0x820 [ 552.342493] ? syscall_return_slowpath+0x5e0/0x5e0 [ 552.347445] ? syscall_return_slowpath+0x31d/0x5e0 [ 552.352402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.358061] ? retint_user+0x18/0x18 [ 552.361795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 552.366659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.371857] RIP: 0033:0x4584ea [ 552.375047] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 552.394490] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 552.402235] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 00000000004584ea [ 552.409522] RDX: 00007f4dd57adad0 RSI: 00000000200001c0 RDI: 00007f4dd57adaf0 [ 552.416816] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 552.424096] R10: 0000000000000030 R11: 0000000000000206 R12: 0000000000000014 [ 552.431382] R13: 0000000000000030 R14: 00000000004d3c90 R15: 000000000000001b 22:53:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da40a3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:18 executing program 5 (fault-call:2 fault-nth:28): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:18 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x17e, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:18 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xffffff7f}, 0x0) 22:53:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4233a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 552.886729] FAULT_INJECTION: forcing a failure. [ 552.886729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 552.898887] CPU: 0 PID: 10050 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 552.906292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.915674] Call Trace: [ 552.918288] dump_stack+0x1c9/0x2b4 [ 552.921948] ? dump_stack_print_info.cold.2+0x52/0x52 [ 552.927180] ? find_get_entries_tag+0x10e0/0x10e0 [ 552.932059] should_fail.cold.4+0xa/0x1a [ 552.936152] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 552.941281] ? print_usage_bug+0xc0/0xc0 [ 552.945675] ? trace_hardirqs_on+0x10/0x10 [ 552.949927] ? print_usage_bug+0xc0/0xc0 [ 552.954003] ? graph_lock+0x170/0x170 [ 552.957849] ? print_usage_bug+0xc0/0xc0 [ 552.961943] ? find_held_lock+0x36/0x1c0 [ 552.966025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.971571] ? should_fail+0x223/0xbed [ 552.975501] __alloc_pages_nodemask+0x36e/0xdb0 [ 552.980184] ? kasan_check_read+0x11/0x20 [ 552.984440] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 552.989473] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 552.993912] ? find_held_lock+0x36/0x1c0 [ 552.998025] ? check_same_owner+0x340/0x340 [ 553.002380] cache_grow_begin+0x91/0x710 [ 553.006500] kmem_cache_alloc+0x689/0x760 [ 553.010662] ? find_held_lock+0x36/0x1c0 [ 553.014741] getname_flags+0xd0/0x5a0 [ 553.018555] user_path_at_empty+0x2d/0x50 [ 553.022802] do_mount+0x17a/0x30e0 [ 553.026350] ? do_raw_spin_unlock+0xa7/0x2f0 [ 553.030770] ? copy_mount_string+0x40/0x40 [ 553.035014] ? rcu_pm_notify+0xc0/0xc0 [ 553.038921] ? copy_mount_options+0x5f/0x380 [ 553.043340] ? rcu_read_lock_sched_held+0x108/0x120 [ 553.048370] ? kmem_cache_alloc_trace+0x616/0x780 [ 553.053230] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 553.058786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.064333] ? copy_mount_options+0x285/0x380 [ 553.068838] ksys_mount+0x12d/0x140 [ 553.072561] __x64_sys_mount+0xbe/0x150 [ 553.076563] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 553.081587] do_syscall_64+0x1b9/0x820 [ 553.085503] ? finish_task_switch+0x1d3/0x870 [ 553.090005] ? syscall_return_slowpath+0x5e0/0x5e0 [ 553.094953] ? syscall_return_slowpath+0x31d/0x5e0 [ 553.099892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.105481] ? retint_user+0x18/0x18 [ 553.109318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 553.114182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.119376] RIP: 0033:0x4584ea [ 553.122563] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 553.141942] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 553.149835] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 00000000004584ea [ 553.157108] RDX: 00007f4dd57adad0 RSI: 00000000200001c0 RDI: 00007f4dd57adaf0 [ 553.164584] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 553.171873] R10: 0000000000000030 R11: 0000000000000206 R12: 0000000000000014 [ 553.179149] R13: 0000000000000030 R14: 00000000004d3c90 R15: 000000000000001c [ 553.188334] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 553.203063] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:19 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:19 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000004004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:19 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcb3, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4360a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e032, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:19 executing program 5 (fault-call:2 fault-nth:29): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:19 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x2}, 0x0) [ 553.581095] FAULT_INJECTION: forcing a failure. [ 553.581095] name failslab, interval 1, probability 0, space 0, times 0 [ 553.592524] CPU: 0 PID: 10073 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 553.599905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.609274] Call Trace: [ 553.611879] dump_stack+0x1c9/0x2b4 [ 553.615526] ? dump_stack_print_info.cold.2+0x52/0x52 [ 553.620736] ? finish_task_switch+0x1d3/0x870 [ 553.625277] ? finish_task_switch+0x18a/0x870 [ 553.629806] should_fail.cold.4+0xa/0x1a [ 553.633894] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 553.639021] ? __schedule+0x884/0x1ed0 [ 553.642925] ? lock_downgrade+0x8f0/0x8f0 [ 553.647106] ? __sched_text_start+0x8/0x8 [ 553.651311] ? find_held_lock+0x36/0x1c0 [ 553.655424] ? __lock_is_held+0xb5/0x140 [ 553.659520] ? check_same_owner+0x340/0x340 [ 553.663863] ? simple_strtoull+0xe6/0x160 [ 553.668064] __should_failslab+0x124/0x180 [ 553.672341] should_failslab+0x9/0x14 [ 553.676176] __kmalloc+0x2c8/0x760 22:53:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da42b3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:19 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000074004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 553.679741] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 553.684784] ? match_number.isra.0+0xbf/0x280 [ 553.689321] match_number.isra.0+0xbf/0x280 [ 553.693699] ? match_strdup+0xa0/0xa0 [ 553.697540] match_int+0x23/0x30 [ 553.700953] parse_options+0x127c/0x29d0 [ 553.705059] ? clear_qf_name+0x150/0x150 [ 553.709121] ? __lock_is_held+0xb5/0x140 [ 553.713193] ? rcu_read_lock_sched_held+0x108/0x120 [ 553.718219] ? __kmalloc_track_caller+0x5f5/0x760 [ 553.723064] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 553.727645] ? kasan_check_write+0x14/0x20 [ 553.731881] ? memcpy+0x45/0x50 [ 553.735175] ext4_remount+0x675/0x2650 [ 553.739090] ? ext4_register_li_request+0xa20/0xa20 [ 553.744119] ? shrink_dentry_list+0x7c0/0x7c0 [ 553.748627] ? lock_release+0xa30/0xa30 [ 553.752611] do_remount_sb+0x350/0x7b0 [ 553.756503] ? ext4_register_li_request+0xa20/0xa20 [ 553.761892] ? user_get_super+0x250/0x250 [ 553.766051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.771591] ? security_capable+0x99/0xc0 [ 553.775750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.781295] ? ns_capable_common+0x13f/0x170 [ 553.785707] do_mount+0x149b/0x30e0 [ 553.789347] ? copy_mount_string+0x40/0x40 [ 553.793594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 553.798460] ? retint_kernel+0x10/0x10 [ 553.802354] ? copy_mount_options+0x1f0/0x380 [ 553.806849] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 553.811703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.817260] ? copy_mount_options+0x285/0x380 [ 553.821787] ksys_mount+0x12d/0x140 [ 553.825424] __x64_sys_mount+0xbe/0x150 [ 553.829403] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 553.834436] do_syscall_64+0x1b9/0x820 [ 553.838323] ? finish_task_switch+0x1d3/0x870 [ 553.842825] ? syscall_return_slowpath+0x5e0/0x5e0 [ 553.847756] ? syscall_return_slowpath+0x31d/0x5e0 [ 553.852792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.858337] ? retint_user+0x18/0x18 [ 553.862060] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 553.866914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.872103] RIP: 0033:0x4584ea [ 553.875278] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 553.894801] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 553.902531] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 00000000004584ea [ 553.909796] RDX: 00007f4dd57adad0 RSI: 00000000200001c0 RDI: 00007f4dd57adaf0 [ 553.917093] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 553.924360] R10: 0000000000000030 R11: 0000000000000206 R12: 0000000000000014 [ 553.931630] R13: 0000000000000030 R14: 00000000004d3c90 R15: 000000000000001d 22:53:19 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcb9, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e065, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:19 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x3}, 0x0) 22:53:19 executing program 5 (fault-call:2 fault-nth:30): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4362500000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000002004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xf00000000000000}, 0x0) [ 554.277448] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 554.292299] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 554.321228] FAULT_INJECTION: forcing a failure. [ 554.321228] name failslab, interval 1, probability 0, space 0, times 0 [ 554.332700] CPU: 1 PID: 10096 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 554.340166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.349526] Call Trace: [ 554.352131] dump_stack+0x1c9/0x2b4 [ 554.355769] ? dump_stack_print_info.cold.2+0x52/0x52 [ 554.361001] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 554.365857] ? __kernel_text_address+0xd/0x40 [ 554.370369] should_fail.cold.4+0xa/0x1a [ 554.374449] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 554.379666] ? save_stack+0xa9/0xd0 [ 554.383312] ? graph_lock+0x170/0x170 [ 554.387124] ? kasan_kmalloc+0xc4/0xe0 [ 554.391032] ? kmem_cache_alloc_trace+0x152/0x780 [ 554.395904] ? kobject_uevent_env+0x20f/0x1110 [ 554.400492] ? kobject_uevent+0x1f/0x30 [ 554.404486] ? find_held_lock+0x36/0x1c0 [ 554.408585] ? __lock_is_held+0xb5/0x140 [ 554.412692] ? check_same_owner+0x340/0x340 [ 554.417040] ? rcu_note_context_switch+0x730/0x730 [ 554.421997] __should_failslab+0x124/0x180 [ 554.426256] should_failslab+0x9/0x14 [ 554.430072] __kmalloc+0x2c8/0x760 [ 554.433626] ? kobject_uevent_env+0x20f/0x1110 [ 554.438319] ? rcu_read_lock_sched_held+0x108/0x120 [ 554.443441] ? kobject_get_path+0xc2/0x1a0 [ 554.447705] kobject_get_path+0xc2/0x1a0 [ 554.451789] kobject_uevent_env+0x234/0x1110 [ 554.456260] kobject_uevent+0x1f/0x30 [ 554.460105] loop_clr_fd+0x62f/0xd70 [ 554.463850] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 554.469411] lo_ioctl+0x84c/0x1d10 [ 554.472975] ? lo_rw_aio_complete+0x450/0x450 [ 554.477504] blkdev_ioctl+0x9cd/0x2030 [ 554.481407] ? blkpg_ioctl+0xc40/0xc40 [ 554.485311] ? lock_downgrade+0x8f0/0x8f0 [ 554.489478] ? kasan_check_read+0x11/0x20 [ 554.493630] ? rcu_is_watching+0x8c/0x150 [ 554.497826] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 554.502260] ? __fget+0x414/0x670 [ 554.505737] ? kfree+0x21/0x260 [ 554.509027] ? expand_files.part.8+0x9c0/0x9c0 [ 554.513629] block_ioctl+0xee/0x130 [ 554.517271] ? blkdev_fallocate+0x400/0x400 [ 554.521606] do_vfs_ioctl+0x1de/0x1720 [ 554.525505] ? kasan_check_write+0x14/0x20 [ 554.529841] ? do_raw_spin_lock+0xc1/0x200 [ 554.534088] ? ioctl_preallocate+0x300/0x300 [ 554.538527] ? __fget_light+0x2f7/0x440 [ 554.542540] ? fget_raw+0x20/0x20 [ 554.546015] ? trace_hardirqs_off+0xd/0x10 [ 554.550263] ? quarantine_put+0x10d/0x1b0 [ 554.554425] ? kfree+0x111/0x260 [ 554.557835] ? ksys_mount+0xa3/0x140 [ 554.561562] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 554.566858] ? security_file_ioctl+0x94/0xc0 [ 554.571285] ksys_ioctl+0xa9/0xd0 [ 554.574760] __x64_sys_ioctl+0x73/0xb0 [ 554.578666] do_syscall_64+0x1b9/0x820 [ 554.582591] ? finish_task_switch+0x1d3/0x870 [ 554.587103] ? syscall_return_slowpath+0x5e0/0x5e0 [ 554.592044] ? syscall_return_slowpath+0x31d/0x5e0 [ 554.597013] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 554.602396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 554.607281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.612480] RIP: 0033:0x455927 [ 554.615669] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 554.635106] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 554.642833] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 0000000000455927 [ 554.650200] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000015 [ 554.657481] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 554.664778] R10: 0000000000000030 R11: 0000000000000246 R12: 0000000000000014 [ 554.672072] R13: 0000000000000030 R14: 00000000004d3c90 R15: 000000000000001e 22:53:20 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040), 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da43d3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:20 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e043, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:20 executing program 5 (fault-call:2 fault-nth:31): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363d00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xfffff000}, 0x0) 22:53:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fffffff400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 554.980287] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 554.987651] BTRFS error (device loop2): superblock checksum mismatch [ 554.995148] BTRFS error (device loop2): open_ctree failed [ 555.011283] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 555.018617] BTRFS error (device loop2): superblock checksum mismatch 22:53:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da42f3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xf0ffff}, 0x0) 22:53:20 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 555.033809] BTRFS error (device loop2): open_ctree failed [ 555.058903] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 555.105263] FAULT_INJECTION: forcing a failure. [ 555.105263] name failslab, interval 1, probability 0, space 0, times 0 [ 555.116806] CPU: 0 PID: 10125 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 555.124217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.133608] Call Trace: [ 555.136217] dump_stack+0x1c9/0x2b4 [ 555.139862] ? dump_stack_print_info.cold.2+0x52/0x52 [ 555.145092] should_fail.cold.4+0xa/0x1a [ 555.149202] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 555.154325] ? active_load_balance_cpu_stop+0x1030/0x1030 [ 555.159893] ? graph_lock+0x170/0x170 [ 555.163746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.169322] ? __perf_event_task_sched_in+0x24f/0xbb0 [ 555.174664] ? graph_lock+0x170/0x170 [ 555.178505] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 555.183380] ? perf_trace_lock+0x920/0x920 [ 555.187645] ? __lock_is_held+0xb5/0x140 [ 555.191771] __should_failslab+0x124/0x180 [ 555.196024] should_failslab+0x9/0x14 [ 555.199845] kmem_cache_alloc+0x47/0x760 22:53:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e00f, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 555.203942] ? rcu_note_context_switch+0x730/0x730 [ 555.208905] ? mempool_free+0x370/0x370 [ 555.212906] mempool_alloc_slab+0x44/0x60 [ 555.217070] mempool_alloc+0x193/0x4b0 [ 555.220999] ? mempool_destroy+0x30/0x30 [ 555.225106] ? lock_downgrade+0x8f0/0x8f0 [ 555.229296] bio_alloc_bioset+0x39c/0x6f0 [ 555.233467] ? bvec_alloc+0x2d0/0x2d0 [ 555.237317] ? check_same_owner+0x340/0x340 [ 555.241740] ? __unlock_page_memcg+0x72/0x100 [ 555.246294] submit_bh_wbc+0x14b/0x790 [ 555.250206] __sync_dirty_buffer+0x1ab/0x3e0 [ 555.254645] ? sync_mapping_buffers+0x190/0x190 [ 555.259344] ext4_commit_super+0x7aa/0xba0 [ 555.263606] __ext4_error+0x1e6/0x5c0 [ 555.267423] ? put_io_context+0x130/0x2e0 [ 555.271589] ? ext4_handle_error+0x3f0/0x3f0 [ 555.276028] ? get_io_context+0x140/0x140 [ 555.280202] ? do_raw_spin_lock+0xc1/0x200 [ 555.284460] ? _raw_spin_unlock+0x22/0x30 [ 555.288623] ? get_task_io_context+0x9d/0x120 [ 555.293130] ? set_task_ioprio+0x2d7/0x5b0 [ 555.297385] ? get_task_ioprio+0xe0/0xe0 [ 555.301490] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 555.306528] ? ext4_get_group_desc+0x1cd/0x2d0 [ 555.311223] ext4_remount+0x1d2a/0x2650 [ 555.315295] ? ext4_register_li_request+0xa20/0xa20 [ 555.320329] ? shrink_dentry_list+0x7c0/0x7c0 [ 555.324846] ? lock_release+0xa30/0xa30 [ 555.328861] do_remount_sb+0x350/0x7b0 [ 555.332759] ? ext4_register_li_request+0xa20/0xa20 [ 555.337815] ? user_get_super+0x250/0x250 [ 555.341996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.347544] ? security_capable+0x99/0xc0 [ 555.351720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.357270] ? ns_capable_common+0x13f/0x170 [ 555.361700] do_mount+0x149b/0x30e0 [ 555.365344] ? copy_mount_string+0x40/0x40 [ 555.369599] ? copy_mount_options+0x5f/0x380 [ 555.374027] ? rcu_read_lock_sched_held+0x108/0x120 [ 555.379064] ? kmem_cache_alloc_trace+0x616/0x780 [ 555.383947] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 555.389521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.395089] ? copy_mount_options+0x285/0x380 [ 555.399612] ksys_mount+0x12d/0x140 [ 555.403310] __x64_sys_mount+0xbe/0x150 [ 555.407325] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 555.412375] do_syscall_64+0x1b9/0x820 [ 555.416296] ? finish_task_switch+0x1d3/0x870 [ 555.420816] ? syscall_return_slowpath+0x5e0/0x5e0 [ 555.425776] ? syscall_return_slowpath+0x31d/0x5e0 [ 555.430733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.436312] ? retint_user+0x18/0x18 [ 555.440062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 555.444942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.450142] RIP: 0033:0x4584ea [ 555.453358] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 555.472818] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 555.480578] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 00000000004584ea [ 555.487861] RDX: 00007f4dd57adad0 RSI: 00000000200001c0 RDI: 00007f4dd57adaf0 [ 555.495143] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 555.502457] R10: 0000000000000030 R11: 0000000000000206 R12: 0000000000000014 [ 555.509771] R13: 0000000000000030 R14: 00000000004d3c90 R15: 000000000000001f [ 555.519798] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:21 executing program 5 (fault-call:2 fault-nth:32): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4364800000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:21 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x4506}, 0x0) 22:53:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da44f3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 555.868024] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 555.875472] BTRFS error (device loop2): superblock checksum mismatch [ 555.902864] BTRFS error (device loop2): open_ctree failed [ 555.924669] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 555.924958] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 555.944553] BTRFS error (device loop2): superblock checksum mismatch [ 555.953636] BTRFS error (device loop2): open_ctree failed [ 555.975904] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 555.983178] BTRFS error (device loop2): superblock checksum mismatch [ 556.014649] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 556.029380] FAULT_INJECTION: forcing a failure. [ 556.029380] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 556.041258] CPU: 1 PID: 10154 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 556.048626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.058014] Call Trace: [ 556.060626] dump_stack+0x1c9/0x2b4 [ 556.064273] ? dump_stack_print_info.cold.2+0x52/0x52 [ 556.069734] ? __mutex_lock+0x7e8/0x1820 [ 556.073834] ? graph_lock+0x170/0x170 [ 556.077679] should_fail.cold.4+0xa/0x1a [ 556.081764] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 556.086902] ? trace_hardirqs_on+0x10/0x10 [ 556.091176] ? perf_trace_lock+0x920/0x920 [ 556.095430] ? trace_hardirqs_on+0x10/0x10 [ 556.099714] ? idr_destroy+0x1c0/0x1c0 [ 556.103638] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 556.109227] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 556.114089] ? find_held_lock+0x36/0x1c0 [ 556.118172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.123723] ? should_fail+0x223/0xbed [ 556.127623] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 556.132503] __alloc_pages_nodemask+0x36e/0xdb0 [ 556.137190] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 556.142219] ? do_raw_spin_unlock+0xa7/0x2f0 [ 556.146676] ? graph_lock+0x170/0x170 [ 556.150491] ? find_held_lock+0x36/0x1c0 [ 556.154569] ? __lock_is_held+0xb5/0x140 [ 556.158655] ? check_same_owner+0x340/0x340 [ 556.163027] cache_grow_begin+0x91/0x710 [ 556.167124] kmem_cache_alloc_trace+0x6a5/0x780 [ 556.171823] ? device_create_file+0x1e0/0x1e0 [ 556.176337] kobject_uevent_env+0x20f/0x1110 [ 556.180781] kobject_uevent+0x1f/0x30 [ 556.184594] loop_clr_fd+0x62f/0xd70 [ 556.188329] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 556.193907] lo_ioctl+0x84c/0x1d10 [ 556.197463] ? lo_rw_aio_complete+0x450/0x450 [ 556.201977] blkdev_ioctl+0x9cd/0x2030 [ 556.205882] ? blkpg_ioctl+0xc40/0xc40 [ 556.209803] ? lock_downgrade+0x8f0/0x8f0 [ 556.213973] ? kasan_check_read+0x11/0x20 [ 556.218131] ? rcu_is_watching+0x8c/0x150 [ 556.222286] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 556.226717] ? __fget+0x414/0x670 [ 556.230269] ? kfree+0x21/0x260 [ 556.233563] ? expand_files.part.8+0x9c0/0x9c0 [ 556.238164] block_ioctl+0xee/0x130 [ 556.241804] ? blkdev_fallocate+0x400/0x400 [ 556.246142] do_vfs_ioctl+0x1de/0x1720 [ 556.250136] ? kasan_check_write+0x14/0x20 [ 556.254574] ? do_raw_spin_lock+0xc1/0x200 [ 556.258826] ? ioctl_preallocate+0x300/0x300 [ 556.263258] ? __fget_light+0x2f7/0x440 [ 556.267247] ? fget_raw+0x20/0x20 [ 556.270802] ? trace_hardirqs_off+0xd/0x10 [ 556.275044] ? quarantine_put+0x10d/0x1b0 [ 556.279211] ? kfree+0x111/0x260 [ 556.282589] ? ksys_mount+0xa3/0x140 [ 556.286316] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 556.291350] ? security_file_ioctl+0x94/0xc0 [ 556.295783] ksys_ioctl+0xa9/0xd0 [ 556.299271] __x64_sys_ioctl+0x73/0xb0 [ 556.303196] do_syscall_64+0x1b9/0x820 [ 556.307111] ? syscall_return_slowpath+0x5e0/0x5e0 [ 556.312063] ? syscall_return_slowpath+0x31d/0x5e0 [ 556.317111] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 556.322505] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 556.327386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.332592] RIP: 0033:0x455927 [ 556.335781] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 556.355223] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 556.362966] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 0000000000455927 [ 556.370250] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000015 [ 556.377546] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 556.384826] R10: 0000000000000030 R11: 0000000000000246 R12: 0000000000000014 [ 556.392234] R13: 0000000000000030 R14: 00000000004d3c90 R15: 0000000000000020 [ 556.403665] BTRFS error (device loop2): open_ctree failed 22:53:22 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040), 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:22 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000007a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e099, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:22 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcae, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:22 executing program 5 (fault-call:2 fault-nth:33): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:22 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x34000}, 0x0) 22:53:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da436ffff070000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4303a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:22 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0xffffff9e}, 0x0) 22:53:22 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000004800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 556.777736] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 556.807818] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffffe4000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e08c, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 556.826163] FAULT_INJECTION: forcing a failure. [ 556.826163] name failslab, interval 1, probability 0, space 0, times 0 [ 556.837594] CPU: 1 PID: 10180 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 556.845012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.854394] Call Trace: [ 556.857041] dump_stack+0x1c9/0x2b4 [ 556.860752] ? dump_stack_print_info.cold.2+0x52/0x52 [ 556.866014] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 556.870898] ? __kernel_text_address+0xd/0x40 [ 556.875452] should_fail.cold.4+0xa/0x1a [ 556.879563] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 556.884716] ? save_stack+0xa9/0xd0 [ 556.888447] ? graph_lock+0x170/0x170 [ 556.892491] ? kasan_kmalloc+0xc4/0xe0 [ 556.896498] ? kmem_cache_alloc_trace+0x152/0x780 [ 556.901382] ? kobject_uevent_env+0x20f/0x1110 [ 556.906037] ? kobject_uevent+0x1f/0x30 [ 556.910147] ? find_held_lock+0x36/0x1c0 [ 556.914261] ? __lock_is_held+0xb5/0x140 [ 556.918369] ? check_same_owner+0x340/0x340 [ 556.922749] ? do_raw_spin_unlock+0xa7/0x2f0 [ 556.927190] ? rcu_note_context_switch+0x730/0x730 [ 556.932681] __should_failslab+0x124/0x180 [ 556.936952] should_failslab+0x9/0x14 [ 556.940793] __kmalloc+0x2c8/0x760 [ 556.944567] ? kobject_uevent_env+0x20f/0x1110 [ 556.949219] ? rcu_read_lock_sched_held+0x108/0x120 [ 556.954453] ? kobject_get_path+0xc2/0x1a0 [ 556.958742] kobject_get_path+0xc2/0x1a0 [ 556.962876] kobject_uevent_env+0x234/0x1110 [ 556.967329] kobject_uevent+0x1f/0x30 [ 556.971163] loop_clr_fd+0x62f/0xd70 22:53:22 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x200000000000000}, 0x0) [ 556.974912] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 556.980497] lo_ioctl+0x84c/0x1d10 [ 556.984072] ? kasan_check_read+0x11/0x20 [ 556.988366] ? lo_rw_aio_complete+0x450/0x450 [ 556.992890] blkdev_ioctl+0x9cd/0x2030 [ 556.996809] ? blkpg_ioctl+0xc40/0xc40 [ 557.000760] ? lock_downgrade+0x8f0/0x8f0 [ 557.004975] ? kernel_text_address+0x79/0xf0 [ 557.009418] ? kasan_check_read+0x11/0x20 [ 557.013613] ? rcu_is_watching+0x8c/0x150 [ 557.017797] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 557.022283] ? __fget+0x414/0x670 [ 557.025787] ? kfree+0x21/0x260 [ 557.029106] ? expand_files.part.8+0x9c0/0x9c0 [ 557.033736] block_ioctl+0xee/0x130 [ 557.037748] ? blkdev_fallocate+0x400/0x400 [ 557.042111] do_vfs_ioctl+0x1de/0x1720 [ 557.046032] ? kasan_check_write+0x14/0x20 [ 557.050328] ? do_raw_spin_lock+0xc1/0x200 [ 557.054639] ? ioctl_preallocate+0x300/0x300 [ 557.059070] ? __fget_light+0x2f7/0x440 [ 557.063066] ? fget_raw+0x20/0x20 [ 557.066534] ? trace_hardirqs_off+0xd/0x10 [ 557.070776] ? quarantine_put+0x10d/0x1b0 [ 557.074929] ? kfree+0x111/0x260 [ 557.078292] ? ksys_mount+0xa3/0x140 [ 557.082044] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 557.087074] ? security_file_ioctl+0x94/0xc0 [ 557.091479] ksys_ioctl+0xa9/0xd0 [ 557.094935] __x64_sys_ioctl+0x73/0xb0 [ 557.098834] do_syscall_64+0x1b9/0x820 [ 557.102729] ? finish_task_switch+0x1d3/0x870 [ 557.107221] ? syscall_return_slowpath+0x5e0/0x5e0 [ 557.112148] ? syscall_return_slowpath+0x31d/0x5e0 [ 557.117093] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 557.122466] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 557.127343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.132529] RIP: 0033:0x455927 [ 557.135714] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 557.154992] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 557.162713] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 0000000000455927 [ 557.169981] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000015 [ 557.177268] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 557.184529] R10: 0000000000000030 R11: 0000000000000246 R12: 0000000000000014 [ 557.191791] R13: 0000000000000030 R14: 00000000004d3c90 R15: 0000000000000021 22:53:23 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801cbb57f18, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:23 executing program 5 (fault-call:2 fault-nth:34): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:23 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000048000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 557.519508] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 557.537377] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 557.552077] print_req_error: I/O error, dev loop2, sector 128 [ 557.560552] FAULT_INJECTION: forcing a failure. [ 557.560552] name failslab, interval 1, probability 0, space 0, times 0 [ 557.571923] CPU: 0 PID: 10217 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 557.579426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.589000] Call Trace: [ 557.591615] dump_stack+0x1c9/0x2b4 [ 557.595269] ? dump_stack_print_info.cold.2+0x52/0x52 [ 557.600470] ? kernel_text_address+0x79/0xf0 [ 557.605028] should_fail.cold.4+0xa/0x1a [ 557.609114] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 557.614276] ? graph_lock+0x170/0x170 [ 557.618110] ? save_stack+0x43/0xd0 [ 557.621749] ? kasan_kmalloc+0xc4/0xe0 [ 557.625877] ? find_held_lock+0x36/0x1c0 [ 557.629961] ? __lock_is_held+0xb5/0x140 [ 557.634056] ? check_same_owner+0x340/0x340 [ 557.638412] ? rcu_note_context_switch+0x730/0x730 [ 557.643359] __should_failslab+0x124/0x180 [ 557.647608] should_failslab+0x9/0x14 [ 557.651422] kmem_cache_alloc_node_trace+0x26f/0x770 [ 557.656562] __kmalloc_node_track_caller+0x33/0x70 [ 557.661508] __kmalloc_reserve.isra.40+0x3a/0xe0 [ 557.666290] __alloc_skb+0x155/0x790 [ 557.670016] ? skb_scrub_packet+0x580/0x580 [ 557.674371] ? kasan_check_read+0x11/0x20 [ 557.678535] ? rcu_is_watching+0x8c/0x150 [ 557.682708] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 557.687156] ? netlink_has_listeners+0x2da/0x4c0 [ 557.691942] ? netlink_tap_init_net+0x3e0/0x3e0 [ 557.696632] alloc_uevent_skb+0x89/0x220 [ 557.700801] kobject_uevent_env+0x866/0x1110 [ 557.705235] kobject_uevent+0x1f/0x30 [ 557.709055] loop_clr_fd+0x62f/0xd70 [ 557.712807] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 557.718366] lo_ioctl+0x84c/0x1d10 [ 557.721939] ? lo_rw_aio_complete+0x450/0x450 [ 557.726441] blkdev_ioctl+0x9cd/0x2030 [ 557.730340] ? blkpg_ioctl+0xc40/0xc40 [ 557.734241] ? lock_downgrade+0x8f0/0x8f0 [ 557.738400] ? kasan_check_read+0x11/0x20 [ 557.742555] ? rcu_is_watching+0x8c/0x150 [ 557.746712] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 557.751139] ? __fget+0x414/0x670 [ 557.754610] ? kfree+0x21/0x260 [ 557.757898] ? expand_files.part.8+0x9c0/0x9c0 [ 557.762514] block_ioctl+0xee/0x130 [ 557.766155] ? blkdev_fallocate+0x400/0x400 [ 557.770501] do_vfs_ioctl+0x1de/0x1720 [ 557.774401] ? kasan_check_write+0x14/0x20 [ 557.778646] ? do_raw_spin_lock+0xc1/0x200 [ 557.782891] ? ioctl_preallocate+0x300/0x300 [ 557.787333] ? __fget_light+0x2f7/0x440 [ 557.791317] ? fget_raw+0x20/0x20 [ 557.794781] ? trace_hardirqs_off+0xd/0x10 [ 557.799037] ? quarantine_put+0x10d/0x1b0 [ 557.803215] ? kfree+0x111/0x260 [ 557.806589] ? ksys_mount+0xa3/0x140 [ 557.810311] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 557.815336] ? security_file_ioctl+0x94/0xc0 [ 557.819755] ksys_ioctl+0xa9/0xd0 [ 557.823219] __x64_sys_ioctl+0x73/0xb0 [ 557.827132] do_syscall_64+0x1b9/0x820 [ 557.831054] ? finish_task_switch+0x1d3/0x870 [ 557.835567] ? syscall_return_slowpath+0x5e0/0x5e0 [ 557.840768] ? syscall_return_slowpath+0x31d/0x5e0 [ 557.845712] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 557.851100] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 557.855980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.861189] RIP: 0033:0x455927 [ 557.864374] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 557.883769] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 557.891503] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 0000000000455927 [ 557.898778] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000015 [ 557.906061] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 557.913513] R10: 0000000000000030 R11: 0000000000000246 R12: 0000000000000014 [ 557.920788] R13: 0000000000000030 R14: 00000000004d3c90 R15: 0000000000000022 22:53:24 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040), 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4364f00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:24 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x9effffff}, 0x0) 22:53:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000018000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:24 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcaf, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:24 executing program 5 (fault-call:2 fault-nth:35): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000200000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e072, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:24 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x45060000}, 0x0) [ 558.283470] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000500000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000003f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4360a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 558.357812] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 558.406840] FAULT_INJECTION: forcing a failure. [ 558.406840] name failslab, interval 1, probability 0, space 0, times 0 [ 558.418225] CPU: 0 PID: 10235 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 558.425595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.434953] Call Trace: [ 558.437568] dump_stack+0x1c9/0x2b4 [ 558.441208] ? dump_stack_print_info.cold.2+0x52/0x52 [ 558.446426] ? kernel_text_address+0x79/0xf0 [ 558.450878] should_fail.cold.4+0xa/0x1a 22:53:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e092, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 558.455069] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 558.460194] ? graph_lock+0x170/0x170 [ 558.464027] ? save_stack+0x43/0xd0 [ 558.467665] ? kasan_kmalloc+0xc4/0xe0 [ 558.471568] ? find_held_lock+0x36/0x1c0 [ 558.475651] ? __lock_is_held+0xb5/0x140 [ 558.479742] ? check_same_owner+0x340/0x340 [ 558.484089] ? rcu_note_context_switch+0x730/0x730 [ 558.489038] __should_failslab+0x124/0x180 [ 558.493286] should_failslab+0x9/0x14 [ 558.497118] kmem_cache_alloc_node_trace+0x26f/0x770 [ 558.502251] __kmalloc_node_track_caller+0x33/0x70 [ 558.507204] __kmalloc_reserve.isra.40+0x3a/0xe0 [ 558.511993] __alloc_skb+0x155/0x790 [ 558.515841] ? skb_scrub_packet+0x580/0x580 [ 558.520205] ? kasan_check_read+0x11/0x20 [ 558.524366] ? rcu_is_watching+0x8c/0x150 [ 558.528522] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 558.532954] ? netlink_has_listeners+0x2da/0x4c0 [ 558.537739] ? netlink_tap_init_net+0x3e0/0x3e0 [ 558.542425] alloc_uevent_skb+0x89/0x220 [ 558.546508] kobject_uevent_env+0x866/0x1110 [ 558.550936] kobject_uevent+0x1f/0x30 [ 558.554757] loop_clr_fd+0x62f/0xd70 [ 558.558488] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 558.564043] lo_ioctl+0x84c/0x1d10 [ 558.567609] ? kasan_check_read+0x11/0x20 [ 558.571764] ? lo_rw_aio_complete+0x450/0x450 [ 558.576276] blkdev_ioctl+0x9cd/0x2030 [ 558.580160] ? blkpg_ioctl+0xc40/0xc40 [ 558.584143] ? lock_downgrade+0x8f0/0x8f0 [ 558.588306] ? kernel_text_address+0x79/0xf0 [ 558.592723] ? kasan_check_read+0x11/0x20 [ 558.596875] ? rcu_is_watching+0x8c/0x150 [ 558.601017] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 558.605425] ? __fget+0x414/0x670 [ 558.608871] ? kfree+0x21/0x260 [ 558.612142] ? expand_files.part.8+0x9c0/0x9c0 [ 558.616721] block_ioctl+0xee/0x130 [ 558.620340] ? blkdev_fallocate+0x400/0x400 [ 558.624654] do_vfs_ioctl+0x1de/0x1720 [ 558.628549] ? kasan_check_write+0x14/0x20 [ 558.632795] ? do_raw_spin_lock+0xc1/0x200 [ 558.637041] ? ioctl_preallocate+0x300/0x300 [ 558.641443] ? __fget_light+0x2f7/0x440 [ 558.645411] ? fget_raw+0x20/0x20 [ 558.648861] ? trace_hardirqs_off+0xd/0x10 [ 558.653109] ? quarantine_put+0x10d/0x1b0 [ 558.657252] ? kfree+0x111/0x260 [ 558.660612] ? ksys_mount+0xa3/0x140 [ 558.664326] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 558.669620] ? security_file_ioctl+0x94/0xc0 [ 558.674030] ksys_ioctl+0xa9/0xd0 [ 558.677482] __x64_sys_ioctl+0x73/0xb0 [ 558.681376] do_syscall_64+0x1b9/0x820 [ 558.685267] ? finish_task_switch+0x1d3/0x870 [ 558.689755] ? syscall_return_slowpath+0x5e0/0x5e0 [ 558.694679] ? syscall_return_slowpath+0x31d/0x5e0 [ 558.699611] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 558.704979] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 558.709827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.715015] RIP: 0033:0x455927 [ 558.718206] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 558.737443] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 558.745154] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 0000000000455927 22:53:24 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffff8801cbb579d8, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:24 executing program 5 (fault-call:2 fault-nth:36): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 558.752426] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000015 [ 558.759694] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 558.766976] R10: 0000000000000030 R11: 0000000000000246 R12: 0000000000000014 [ 558.775097] R13: 0000000000000030 R14: 00000000004d3c90 R15: 0000000000000023 22:53:24 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4506000000000000}, 0x0) [ 559.133375] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 559.149486] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 559.164736] FAULT_INJECTION: forcing a failure. [ 559.164736] name failslab, interval 1, probability 0, space 0, times 0 [ 559.176231] CPU: 0 PID: 10272 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #145 [ 559.183619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.193014] Call Trace: [ 559.195614] dump_stack+0x1c9/0x2b4 [ 559.199250] ? dump_stack_print_info.cold.2+0x52/0x52 [ 559.204455] ? __kernel_text_address+0xd/0x40 [ 559.208961] should_fail.cold.4+0xa/0x1a [ 559.213032] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 559.218146] ? save_stack+0xa9/0xd0 [ 559.221780] ? graph_lock+0x170/0x170 [ 559.225602] ? kasan_kmalloc+0xc4/0xe0 [ 559.229494] ? kmem_cache_alloc_trace+0x152/0x780 [ 559.234338] ? kobject_uevent_env+0x20f/0x1110 [ 559.238928] ? kobject_uevent+0x1f/0x30 [ 559.242916] ? loop_clr_fd+0x62f/0xd70 [ 559.246831] ? find_held_lock+0x36/0x1c0 [ 559.250910] ? __lock_is_held+0xb5/0x140 [ 559.254991] ? check_same_owner+0x340/0x340 [ 559.259319] ? do_raw_spin_unlock+0xa7/0x2f0 [ 559.263735] ? rcu_note_context_switch+0x730/0x730 [ 559.268677] __should_failslab+0x124/0x180 [ 559.272945] should_failslab+0x9/0x14 [ 559.276748] __kmalloc+0x2c8/0x760 [ 559.280294] ? kobject_uevent_env+0x20f/0x1110 [ 559.284881] ? rcu_read_lock_sched_held+0x108/0x120 [ 559.289910] ? kobject_get_path+0xc2/0x1a0 [ 559.294158] kobject_get_path+0xc2/0x1a0 [ 559.298249] kobject_uevent_env+0x234/0x1110 [ 559.302687] kobject_uevent+0x1f/0x30 [ 559.306499] loop_clr_fd+0x62f/0xd70 [ 559.310224] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 559.315776] lo_ioctl+0x84c/0x1d10 [ 559.319328] ? kasan_check_read+0x11/0x20 [ 559.323480] ? lo_rw_aio_complete+0x450/0x450 [ 559.327992] blkdev_ioctl+0x9cd/0x2030 [ 559.331887] ? blkpg_ioctl+0xc40/0xc40 [ 559.335785] ? lock_downgrade+0x8f0/0x8f0 [ 559.339934] ? kernel_text_address+0x79/0xf0 [ 559.344353] ? kasan_check_read+0x11/0x20 [ 559.348505] ? rcu_is_watching+0x8c/0x150 [ 559.352655] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 559.357072] ? __fget+0x414/0x670 [ 559.360532] ? kfree+0x21/0x260 [ 559.363826] ? expand_files.part.8+0x9c0/0x9c0 [ 559.368422] block_ioctl+0xee/0x130 [ 559.372063] ? blkdev_fallocate+0x400/0x400 [ 559.376385] do_vfs_ioctl+0x1de/0x1720 [ 559.380277] ? kasan_check_write+0x14/0x20 [ 559.384511] ? do_raw_spin_lock+0xc1/0x200 [ 559.388750] ? ioctl_preallocate+0x300/0x300 [ 559.393177] ? __fget_light+0x2f7/0x440 [ 559.397157] ? fget_raw+0x20/0x20 [ 559.400630] ? trace_hardirqs_off+0xd/0x10 [ 559.405065] ? quarantine_put+0x10d/0x1b0 [ 559.409215] ? kfree+0x111/0x260 [ 559.412597] ? ksys_mount+0xa3/0x140 [ 559.416319] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 559.421339] ? security_file_ioctl+0x94/0xc0 [ 559.425750] ksys_ioctl+0xa9/0xd0 [ 559.429222] __x64_sys_ioctl+0x73/0xb0 [ 559.433134] do_syscall_64+0x1b9/0x820 [ 559.437022] ? finish_task_switch+0x1d3/0x870 [ 559.441531] ? syscall_return_slowpath+0x5e0/0x5e0 [ 559.446465] ? syscall_return_slowpath+0x31d/0x5e0 [ 559.451405] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 559.456779] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 559.461634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.466826] RIP: 0033:0x455927 [ 559.470011] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 559.489393] RSP: 002b:00007f4dd57ada88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 559.497116] RAX: ffffffffffffffda RBX: 00007f4dd57adb30 RCX: 0000000000455927 [ 559.504385] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000015 [ 559.511684] RBP: 00000000200001c0 R08: 00007f4dd57adb30 R09: 00007f4dd57adad0 [ 559.518958] R10: 0000000000000030 R11: 0000000000000246 R12: 0000000000000014 [ 559.526230] R13: 0000000000000030 R14: 00000000004d3c90 R15: 0000000000000024 22:53:25 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:25 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000000000003f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4362500000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ddde000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e04b, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:25 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 22:53:25 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdcb4, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:25 executing program 5 (fault-call:2 fault-nth:37): mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:25 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 559.880571] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4364800000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 559.940428] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:25 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000fffffdfc004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:25 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:25 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3800, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e068, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afeffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:25 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 560.331418] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 560.400520] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:26 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da436ffff070000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:26 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:26 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 22:53:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afbffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e018, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:26 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7ffffffc, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:26 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="07b500", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:26 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x645}, 0x0) 22:53:27 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000001004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 561.128759] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000200000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363d00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 561.222395] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:27 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="060600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 561.275588] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 561.292167] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e02d, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:27 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3400, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:27 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) [ 561.517777] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 561.550765] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 561.587313] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 561.606874] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:28 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x2000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:28 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffff4000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000a0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:28 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 22:53:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e074, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:28 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="600600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:28 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da43d3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 562.364339] BTRFS error (device loop1): superblock checksum mismatch [ 562.374497] BTRFS error (device loop1): open_ctree failed [ 562.382506] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:28 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4506}, 0x0) 22:53:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e004, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:28 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4483a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 562.410598] BTRFS error (device loop1): superblock checksum mismatch [ 562.428733] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 562.437864] BTRFS error (device loop1): open_ctree failed 22:53:28 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="7a0600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 562.470977] BTRFS error (device loop1): superblock checksum mismatch [ 562.472501] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 562.491532] BTRFS error (device loop1): open_ctree failed [ 562.498255] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 562.512774] BTRFS error (device loop1): superblock checksum mismatch 22:53:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffffd000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a6c000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 562.579094] BTRFS error (device loop1): open_ctree failed 22:53:28 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 22:53:28 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000004c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 562.741542] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 562.748845] BTRFS error (device loop2): superblock checksum mismatch [ 562.761180] BTRFS error (device loop2): open_ctree failed 22:53:29 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:29 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da44f3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:29 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="6c0600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e049, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:29 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 22:53:29 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ffffff8c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000971000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffff6000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 563.644402] EXT4-fs error: 2 callbacks suppressed [ 563.644420] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 563.667380] BTRFS error (device loop7): superblock checksum mismatch 22:53:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00050000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:29 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x300}, 0x0) [ 563.700488] BTRFS error (device loop7): open_ctree failed [ 563.719279] EXT4-fs: 2 callbacks suppressed [ 563.719292] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 563.741312] BTRFS error (device loop7): superblock checksum mismatch 22:53:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e09c, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:29 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4233a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 563.766396] BTRFS error (device loop7): open_ctree failed [ 563.792178] BTRFS error (device loop7): superblock checksum mismatch 22:53:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000048000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 563.818881] BTRFS error (device loop7): open_ctree failed [ 563.826952] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 563.848467] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:29 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000001c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:29 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="480600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:29 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) [ 564.101446] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 564.108748] BTRFS error (device loop2): superblock checksum mismatch [ 564.151159] BTRFS error (device loop2): open_ctree failed [ 564.164928] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 564.172289] BTRFS error (device loop2): superblock checksum mismatch [ 564.187753] BTRFS error (device loop2): open_ctree failed [ 564.226690] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 564.239569] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 564.247736] BTRFS error (device loop2): superblock checksum mismatch [ 564.256134] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 564.295112] BTRFS error (device loop2): open_ctree failed [ 564.316864] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 564.331959] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:30 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x141400) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363af6ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e050, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:30 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) 22:53:30 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da42d3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:30 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:30 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='\x00 \x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00c0ffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 564.892931] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:30 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xf00000000000000}, 0x0) 22:53:30 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000f5ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 564.936806] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 564.944122] BTRFS error (device loop2): superblock checksum mismatch [ 564.951221] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ea1c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e009, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 564.979836] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 565.008113] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 565.009562] BTRFS error (device loop2): open_ctree failed 22:53:30 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000500", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 565.058275] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 565.065641] BTRFS error (device loop2): superblock checksum mismatch 22:53:30 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da40a3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 565.106352] BTRFS error (device loop2): open_ctree failed 22:53:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363af4ff0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:31 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) [ 565.337594] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 565.368452] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 565.408135] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 565.434580] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 565.441919] BTRFS error (device loop2): superblock checksum mismatch [ 565.454015] BTRFS error (device loop2): open_ctree failed [ 565.456009] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:31 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x1, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:31 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000971004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e052, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:31 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 22:53:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ea1a0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:31 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da42b3a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:31 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='\x00\n\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00740000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:32 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 566.205677] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 566.234798] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 566.243163] BTRFS error (device loop2): superblock checksum mismatch [ 566.251113] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e075, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 566.287728] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 566.291902] BTRFS error (device loop2): open_ctree failed [ 566.316244] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 566.327820] BTRFS error (device loop2): unsupported checksum algorithm 3786 22:53:32 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="4c0600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 566.335202] BTRFS error (device loop2): superblock checksum mismatch [ 566.345946] BTRFS error (device loop2): open_ctree failed [ 566.360606] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 566.368098] BTRFS error (device loop2): superblock checksum mismatch 22:53:32 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000000000001f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:32 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4303a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 566.409864] BTRFS error (device loop2): open_ctree failed [ 566.421089] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 566.428488] BTRFS error (device loop2): superblock checksum mismatch 22:53:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363aea220000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:32 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) [ 566.474190] BTRFS error (device loop2): open_ctree failed 22:53:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363addd80000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 566.703364] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 566.710629] BTRFS error (device loop2): superblock checksum mismatch [ 566.744364] BTRFS error (device loop2): open_ctree failed [ 566.774762] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 566.782070] BTRFS error (device loop2): superblock checksum mismatch [ 566.805502] BTRFS error (device loop2): open_ctree failed [ 566.817786] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 566.825269] BTRFS error (device loop2): superblock checksum mismatch [ 566.868975] BTRFS error (device loop2): open_ctree failed 22:53:33 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x1, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:33 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="001f00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e041, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:33 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xf}, 0x0) 22:53:33 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000fff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000400000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:33 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da436ffff070000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a8cffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:33 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 567.563392] BTRFS error (device loop1): superblock checksum mismatch [ 567.570796] BTRFS error (device loop1): open_ctree failed [ 567.579342] BTRFS error (device loop1): superblock checksum mismatch [ 567.588378] BTRFS error (device loop1): open_ctree failed 22:53:33 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4360a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:33 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="008c00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 567.617496] BTRFS error (device loop1): superblock checksum mismatch [ 567.642409] BTRFS error (device loop1): open_ctree failed [ 567.654179] BTRFS error (device loop1): superblock checksum mismatch 22:53:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ea19000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:33 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fffffffb00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e077, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 567.678198] BTRFS error (device loop1): open_ctree failed 22:53:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000fffffffe0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:33 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 568.016836] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 568.024501] BTRFS error (device loop2): superblock checksum mismatch [ 568.033389] BTRFS error (device loop2): open_ctree failed [ 568.042985] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 568.050231] BTRFS error (device loop2): superblock checksum mismatch [ 568.077506] BTRFS error (device loop2): open_ctree failed [ 568.087668] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 568.095329] BTRFS error (device loop2): superblock checksum mismatch [ 568.157260] BTRFS error (device loop2): open_ctree failed 22:53:34 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xa054, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:34 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4364f00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:34 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="680600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:34 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fffffdfc00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:34 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 22:53:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e045, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000040000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ea17000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 568.927713] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 568.935200] BTRFS error (device loop2): superblock checksum mismatch [ 568.946397] BTRFS error (device loop2): open_ctree failed [ 568.974776] print_req_error: I/O error, dev loop2, sector 128 22:53:34 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363d00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:34 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 569.028680] EXT4-fs error: 6 callbacks suppressed [ 569.028698] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffffd000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e08a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:34 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000003f00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 569.104821] EXT4-fs: 6 callbacks suppressed [ 569.104834] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 569.130301] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:34 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="030600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 569.147528] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:35 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xf00}, 0x0) [ 569.370436] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 569.378115] BTRFS error (device loop2): superblock checksum mismatch [ 569.407135] BTRFS error (device loop2): open_ctree failed [ 569.418869] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 569.426590] BTRFS error (device loop2): superblock checksum mismatch [ 569.449905] BTRFS error (device loop2): open_ctree failed [ 569.472336] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 569.479609] BTRFS error (device loop2): superblock checksum mismatch [ 569.523811] BTRFS error (device loop2): open_ctree failed [ 569.561613] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 569.604091] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 569.635660] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 569.651597] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:36 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:36 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4362500000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:36 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00007400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00050000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e006, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:36 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='\x00\a\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffffffffffff40000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:36 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) [ 570.354617] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 570.357991] BTRFS error (device loop1): superblock checksum mismatch [ 570.378470] BTRFS error (device loop1): open_ctree failed [ 570.383324] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:36 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) [ 570.401514] BTRFS error (device loop1): superblock checksum mismatch 22:53:36 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4364800000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 570.432384] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 570.438166] BTRFS error (device loop1): open_ctree failed [ 570.457684] BTRFS error (device loop1): superblock checksum mismatch [ 570.469831] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000180000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 570.471067] BTRFS error (device loop1): open_ctree failed [ 570.495564] BTRFS error (device loop1): superblock checksum mismatch 22:53:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e056, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:36 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='\x00Z\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:36 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00001000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 570.534367] BTRFS error (device loop1): open_ctree failed 22:53:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ea1b0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:36 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) [ 570.844945] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 570.852509] BTRFS error (device loop2): superblock checksum mismatch [ 570.861815] BTRFS error (device loop2): open_ctree failed [ 570.937671] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 570.953501] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 571.028253] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 571.065555] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:37 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:37 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a04000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:37 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000feffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00c0ffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000060000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e06e, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:37 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="07bd00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:37 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 22:53:37 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) [ 571.790343] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 571.803881] BTRFS error (device loop1): superblock checksum mismatch [ 571.818357] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 571.820407] BTRFS error (device loop1): open_ctree failed [ 571.835752] BTRFS error (device loop1): superblock checksum mismatch [ 571.846863] BTRFS error (device loop1): open_ctree failed [ 571.859999] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:37 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000230000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 571.890225] BTRFS error (device loop1): superblock checksum mismatch [ 571.892879] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 571.897493] BTRFS error (device loop1): open_ctree failed [ 571.926568] BTRFS error (device loop1): superblock checksum mismatch 22:53:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000800000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:37 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000fffffff6004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e08d, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 571.955676] BTRFS error (device loop1): open_ctree failed 22:53:37 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="040600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000040000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:37 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x3}, 0x0) [ 572.175492] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 572.183070] BTRFS error (device loop2): superblock checksum mismatch [ 572.191486] BTRFS error (device loop2): open_ctree failed 22:53:38 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:38 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000048000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:38 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 22:53:38 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000006c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e04c, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00060000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000050000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:38 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="070600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:39 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0x45060000}, 0x0) [ 573.141760] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 573.149156] BTRFS error (device loop2): superblock checksum mismatch [ 573.173425] BTRFS error (device loop2): open_ctree failed 22:53:39 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="020600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 573.192319] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 573.199618] BTRFS error (device loop2): superblock checksum mismatch 22:53:39 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00090000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 573.237963] BTRFS error (device loop2): open_ctree failed [ 573.265815] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 573.273272] BTRFS error (device loop2): superblock checksum mismatch 22:53:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e053, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 573.300346] BTRFS error (device loop2): open_ctree failed [ 573.309484] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 573.316736] BTRFS error (device loop2): superblock checksum mismatch 22:53:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000004c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:39 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 22:53:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a18000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:39 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 573.354316] BTRFS error (device loop2): open_ctree failed [ 573.570488] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 573.577938] BTRFS error (device loop2): superblock checksum mismatch [ 573.603621] BTRFS error (device loop2): open_ctree failed [ 573.620965] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 573.628240] BTRFS error (device loop2): superblock checksum mismatch [ 573.648739] BTRFS error (device loop2): open_ctree failed 22:53:40 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:40 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:40 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="100600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:40 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a930c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000ffffffe40000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:40 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000fff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000100000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e031, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:40 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 574.376973] EXT4-fs error: 6 callbacks suppressed [ 574.376987] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 574.395768] EXT4-fs: 6 callbacks suppressed [ 574.395797] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:40 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000006c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 574.424185] BTRFS error (device loop1): superblock checksum mismatch 22:53:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e093, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 574.455984] BTRFS error (device loop1): open_ctree failed [ 574.469903] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 574.470073] BTRFS error (device loop1): superblock checksum mismatch [ 574.493912] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:40 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dcae0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:40 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='\x004\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000001fffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 574.534776] BTRFS error (device loop1): open_ctree failed [ 574.551760] BTRFS error (device loop1): superblock checksum mismatch [ 574.569889] BTRFS error (device loop1): open_ctree failed 22:53:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ea230000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:40 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 574.850448] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 574.870264] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 574.876340] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 574.877508] BTRFS error (device loop2): superblock checksum mismatch [ 574.884244] BTRFS error (device loop2): open_ctree failed [ 574.899919] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 574.907162] BTRFS error (device loop2): superblock checksum mismatch [ 574.928349] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 574.954843] BTRFS error (device loop2): open_ctree failed [ 574.964021] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:41 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8001, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:41 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000000c930000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000900000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:41 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='\x00\t\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e059, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00070000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:41 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a87e00000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000010010000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 575.631913] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 575.637464] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 575.639451] BTRFS error (device loop2): superblock checksum mismatch 22:53:41 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 575.681277] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 575.720023] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e061, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffffffffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 575.740643] BTRFS error (device loop2): open_ctree failed [ 575.748491] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 575.763003] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 575.770431] BTRFS error (device loop2): superblock checksum mismatch [ 575.783386] BTRFS error (device loop2): open_ctree failed 22:53:41 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="740600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:41 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000fffffffd0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 575.791805] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 575.799115] BTRFS error (device loop2): superblock checksum mismatch [ 575.828468] BTRFS error (device loop2): open_ctree failed 22:53:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000fffffffb0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000007004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 576.020364] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 576.034351] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 576.066814] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 576.084188] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 576.101940] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 576.109234] BTRFS error (device loop2): superblock checksum mismatch [ 576.124003] BTRFS error (device loop2): open_ctree failed 22:53:42 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x0, 0x5, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:42 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e04f, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a4c000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:42 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="2d0600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:42 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000fffffffe0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dde20000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000020004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:42 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 576.853657] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 576.857178] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 576.860879] BTRFS error (device loop2): superblock checksum mismatch [ 576.873592] BTRFS error (device loop2): open_ctree failed [ 576.888362] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:42 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000700000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e042, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 576.902043] BTRFS error (device loop7): superblock checksum mismatch [ 576.920258] BTRFS error (device loop7): open_ctree failed [ 576.935554] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:42 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 576.956341] BTRFS error (device loop7): superblock checksum mismatch [ 576.956782] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 576.975590] BTRFS error (device loop7): open_ctree failed [ 576.985795] BTRFS error (device loop7): superblock checksum mismatch 22:53:42 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="c00600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ea20000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 577.015121] BTRFS error (device loop7): open_ctree failed 22:53:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000004000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:42 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 577.189645] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 577.197139] BTRFS error (device loop2): superblock checksum mismatch [ 577.209296] BTRFS error (device loop2): open_ctree failed [ 577.226736] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 577.234291] BTRFS error (device loop2): superblock checksum mismatch [ 577.258590] BTRFS error (device loop2): open_ctree failed 22:53:43 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x0, 0x0, 0x1, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:43 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e069, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:43 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000fffffff4004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a1aea0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:43 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:43 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="050600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffff5000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 578.172891] BTRFS error (device loop1): superblock checksum mismatch [ 578.193808] BTRFS error (device loop1): open_ctree failed 22:53:44 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00480000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 578.220639] BTRFS error (device loop1): superblock checksum mismatch 22:53:44 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="090600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 578.258595] BTRFS error (device loop1): open_ctree failed [ 578.270679] BTRFS error (device loop1): superblock checksum mismatch 22:53:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e04d, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 578.300261] BTRFS error (device loop1): open_ctree failed [ 578.333550] BTRFS error (device loop1): superblock checksum mismatch 22:53:44 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000032fac0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:44 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ffffff8c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:44 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 578.384724] BTRFS error (device loop1): open_ctree failed 22:53:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000ffffc0000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 578.630154] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 578.637560] BTRFS error (device loop2): superblock checksum mismatch [ 578.648337] BTRFS error (device loop2): open_ctree failed [ 578.658414] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 578.665849] BTRFS error (device loop2): superblock checksum mismatch [ 578.684874] BTRFS error (device loop2): open_ctree failed 22:53:45 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x0, 0x0, 0x0, 0x4, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:45 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00b50700", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afcfdffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:45 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e012, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:45 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000480000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ea1f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:45 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000097100000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 579.467114] EXT4-fs error: 6 callbacks suppressed [ 579.467130] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 579.490461] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 579.498077] BTRFS error (device loop2): superblock checksum mismatch [ 579.505180] EXT4-fs: 6 callbacks suppressed [ 579.505193] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 579.544432] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 579.563371] BTRFS error (device loop2): open_ctree failed [ 579.573351] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 579.580931] BTRFS error (device loop2): superblock checksum mismatch 22:53:45 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:45 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363af4000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 579.587840] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:45 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='\x00Z\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e07a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 579.617996] BTRFS error (device loop2): open_ctree failed [ 579.640574] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 579.648254] BTRFS error (device loop2): superblock checksum mismatch [ 579.662394] BTRFS error (device loop2): open_ctree failed [ 579.680877] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 579.688317] BTRFS error (device loop2): superblock checksum mismatch [ 579.698468] BTRFS error (device loop2): open_ctree failed [ 579.714099] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 579.721373] BTRFS error (device loop2): superblock checksum mismatch 22:53:45 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ffffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ea1e0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 579.762710] BTRFS error (device loop2): open_ctree failed 22:53:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000600000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:45 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 579.941937] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 579.961466] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 579.968948] BTRFS error (device loop2): superblock checksum mismatch [ 579.975832] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 579.998064] BTRFS error (device loop2): open_ctree failed [ 580.006735] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 580.022674] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:46 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x0, 0x0, 0x0, 0x0, 0x772}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e055, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:46 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:46 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="008c00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:46 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00007109000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:46 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dddb0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:46 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 580.743432] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 580.770375] BTRFS error (device loop1): superblock checksum mismatch [ 580.784172] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 580.786121] BTRFS error (device loop1): open_ctree failed [ 580.813141] BTRFS error (device loop1): superblock checksum mismatch [ 580.831751] BTRFS error (device loop1): open_ctree failed 22:53:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e09a, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:46 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a950c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 580.839141] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 580.855806] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 580.856760] BTRFS error (device loop1): superblock checksum mismatch [ 580.871851] BTRFS error (device loop1): open_ctree failed [ 580.885271] BTRFS error (device loop1): superblock checksum mismatch 22:53:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a23000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:46 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00007fffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:46 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="001000", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 580.913716] BTRFS error (device loop1): open_ctree failed 22:53:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a09000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:46 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 581.155401] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 581.163279] BTRFS error (device loop2): superblock checksum mismatch [ 581.177497] BTRFS error (device loop2): open_ctree failed [ 581.262903] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 581.305568] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 581.341108] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 581.357160] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:47 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e06d, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:47 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ffff1f0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a97ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:47 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363af6ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:47 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000500", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:47 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:47 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 582.111831] BTRFS error (device loop1): superblock checksum mismatch [ 582.126179] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 582.134930] BTRFS error (device loop1): open_ctree failed 22:53:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e062, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 582.161710] BTRFS error (device loop1): superblock checksum mismatch [ 582.167225] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 582.187728] BTRFS error (device loop1): open_ctree failed 22:53:48 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000020000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000dde2000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 582.216833] BTRFS error (device loop1): superblock checksum mismatch [ 582.236172] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 582.250592] BTRFS error (device loop1): open_ctree failed [ 582.268114] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 582.276541] BTRFS error (device loop1): superblock checksum mismatch 22:53:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363aea230000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:48 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:48 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='\x004\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 582.316470] BTRFS error (device loop1): open_ctree failed 22:53:48 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000600000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 582.509713] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 582.516979] BTRFS error (device loop2): superblock checksum mismatch [ 582.544995] BTRFS error (device loop2): open_ctree failed [ 582.573645] BTRFS error (device loop1): superblock checksum mismatch [ 582.618814] BTRFS error (device loop1): open_ctree failed 22:53:49 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x5, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:49 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:49 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a05000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adddb0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:49 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='\x00\a\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363aea1e0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:49 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000005004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:49 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 583.383112] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 583.390451] BTRFS error (device loop2): superblock checksum mismatch [ 583.397608] BTRFS error (device loop2): open_ctree failed [ 583.405954] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 583.413315] BTRFS error (device loop2): superblock checksum mismatch [ 583.421817] BTRFS error (device loop2): open_ctree failed 22:53:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000068000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:49 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='\x00\t\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:49 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000030000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 583.444299] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 583.452076] BTRFS error (device loop2): superblock checksum mismatch [ 583.481406] BTRFS error (device loop2): open_ctree failed 22:53:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x8300, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:49 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 583.490410] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 583.497736] BTRFS error (device loop2): superblock checksum mismatch [ 583.526944] BTRFS error (device loop2): open_ctree failed 22:53:49 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ae1dd0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 583.695844] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 583.703132] BTRFS error (device loop2): superblock checksum mismatch [ 583.710535] BTRFS error (device loop2): open_ctree failed [ 583.723770] print_req_error: I/O error, dev loop0, sector 128 [ 583.733486] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 583.740795] BTRFS error (device loop2): superblock checksum mismatch [ 583.748942] BTRFS error (device loop2): open_ctree failed [ 583.766719] print_req_error: I/O error, dev loop2, sector 128 22:53:50 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x4e24, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:50 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0fff0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:50 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='\x00\n\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:50 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000005000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:50 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40773, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dde00000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 584.720808] EXT4-fs error: 6 callbacks suppressed [ 584.720823] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:53:50 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363aea190000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:50 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00002300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 584.767460] BTRFS error (device loop1): superblock checksum mismatch [ 584.785012] EXT4-fs: 6 callbacks suppressed [ 584.789754] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 584.805543] BTRFS error (device loop1): open_ctree failed 22:53:50 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000200", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 584.819990] BTRFS error (device loop1): superblock checksum mismatch [ 584.828826] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 584.845478] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 584.855261] BTRFS error (device loop1): open_ctree failed 22:53:50 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a44300300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a87e00000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407a9, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:50 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 585.155954] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 585.163205] BTRFS error (device loop2): superblock checksum mismatch [ 585.173140] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 585.185937] BTRFS error (device loop2): open_ctree failed [ 585.193798] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 585.201070] BTRFS error (device loop2): superblock checksum mismatch [ 585.220285] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 585.262854] BTRFS error (device loop2): open_ctree failed [ 585.271811] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 585.287511] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:51 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x2030564f, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000680000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:51 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00007a00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:51 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000001000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:51 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:51 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00bd0700", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000003f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4076c, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:51 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 585.954351] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 585.978831] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 585.986093] BTRFS error (device loop2): superblock checksum mismatch 22:53:51 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000011000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 586.014403] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 586.024102] BTRFS error (device loop2): open_ctree failed [ 586.038274] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 586.045494] BTRFS error (device loop2): superblock checksum mismatch 22:53:51 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffffd000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 586.068638] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 586.082488] BTRFS error (device loop2): open_ctree failed [ 586.091581] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 586.098940] BTRFS error (device loop2): superblock checksum mismatch [ 586.110413] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:52 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00067a00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 586.136221] BTRFS error (device loop2): open_ctree failed 22:53:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000001000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40762, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a007a0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:52 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 586.296093] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 586.303417] BTRFS error (device loop2): superblock checksum mismatch [ 586.311243] BTRFS error (device loop2): open_ctree failed [ 586.421565] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 586.436263] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 586.484158] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 586.499537] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:52 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}, 0x4}}}, &(0x7f00000002c0)=0x84) 22:53:52 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000c0ed000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:52 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a004c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:52 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000080000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000020000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:52 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407bc, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 587.131695] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 587.146349] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 587.168623] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 587.185487] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 587.212498] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 587.219744] BTRFS error (device loop2): superblock checksum mismatch 22:53:53 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:53 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00062d00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 587.247710] BTRFS error (device loop2): open_ctree failed [ 587.256912] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 587.264199] BTRFS error (device loop2): superblock checksum mismatch [ 587.273118] BTRFS error (device loop2): open_ctree failed 22:53:53 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000fffffff50000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000060000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 587.292471] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 587.299720] BTRFS error (device loop2): superblock checksum mismatch [ 587.319543] BTRFS error (device loop2): open_ctree failed [ 587.327467] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 587.334689] BTRFS error (device loop2): superblock checksum mismatch 22:53:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000001c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 587.380254] BTRFS error (device loop2): open_ctree failed [ 587.391283] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 587.398515] BTRFS error (device loop2): superblock checksum mismatch [ 587.414105] BTRFS error (device loop2): open_ctree failed 22:53:53 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000006c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407ac, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 587.512670] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 587.520181] BTRFS error (device loop2): superblock checksum mismatch [ 587.528476] BTRFS error (device loop2): open_ctree failed [ 587.542261] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 587.549486] BTRFS error (device loop2): superblock checksum mismatch [ 587.579505] BTRFS error (device loop2): open_ctree failed 22:53:54 executing program 3: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000a61000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0x72, 0x5, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, &(0x7f00000002c0)=0x84) 22:53:54 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ea1f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:54 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000009710000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:54 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:53:54 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00007fffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a48000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40800, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:54 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 588.467906] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 588.475192] BTRFS error (device loop2): superblock checksum mismatch [ 588.524100] BTRFS error (device loop2): open_ctree failed [ 588.532658] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 588.539987] BTRFS error (device loop2): superblock checksum mismatch [ 588.547974] BTRFS error (device loop2): open_ctree failed 22:53:54 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000004000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:54 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffdfc000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 588.572434] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 588.580014] BTRFS error (device loop2): superblock checksum mismatch [ 588.588370] BTRFS error (device loop2): open_ctree failed [ 588.600131] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 588.607623] BTRFS error (device loop2): superblock checksum mismatch 22:53:54 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000001f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 588.648814] BTRFS error (device loop2): open_ctree failed 22:53:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adedd0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:54 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x2000000) 22:53:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407ba, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 588.804786] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 588.812076] BTRFS error (device loop2): superblock checksum mismatch [ 588.822728] BTRFS error (device loop2): open_ctree failed [ 588.844679] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 588.851928] BTRFS error (device loop2): superblock checksum mismatch [ 588.874244] BTRFS error (device loop2): open_ctree failed [ 588.885373] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 588.892969] BTRFS error (device loop2): superblock checksum mismatch [ 588.916872] BTRFS error (device loop2): open_ctree failed 22:53:55 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363aea1f0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:55 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000001fffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:55 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xfffffff0) 22:53:55 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000edc000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a07000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407a1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000000c0)}, 0x0) [ 589.697621] BTRFS error (device loop1): superblock checksum mismatch [ 589.715529] BTRFS error (device loop1): open_ctree failed [ 589.734666] BTRFS error (device loop1): superblock checksum mismatch [ 589.742847] EXT4-fs error: 7 callbacks suppressed 22:53:55 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xf0ffffffffffff) [ 589.742870] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 589.768997] BTRFS error (device loop1): open_ctree failed [ 589.782934] BTRFS error (device loop1): superblock checksum mismatch 22:53:55 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000ffffff970000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:55 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006fffffd", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:55 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) r1 = dup(r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x20) 22:53:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 589.835308] BTRFS error (device loop1): open_ctree failed [ 589.854665] BTRFS error (device loop1): superblock checksum mismatch 22:53:55 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000097ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:55 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xfffff000) [ 589.916614] BTRFS error (device loop1): open_ctree failed 22:53:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363aea200000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40764, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:55 executing program 3: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) semget(0xffffffffffffffff, 0x0, 0x0) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000000300)={&(0x7f0000002100)=""/4096, 0x1000}) 22:53:55 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000ffffc0000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 590.021654] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 590.029203] BTRFS error (device loop2): superblock checksum mismatch [ 590.049897] BTRFS error (device loop2): open_ctree failed 22:53:55 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x9effffff) [ 590.158002] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 590.181269] EXT4-fs: 8 callbacks suppressed [ 590.181282] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ad2f873574f257e0a0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:56 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006000300", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 590.235957] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 590.253109] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:56 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ffffffffffffff7f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0x0) 22:53:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000edc0000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 590.395498] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 590.402827] BTRFS error (device loop2): superblock checksum mismatch 22:53:56 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xf0ffff) 22:53:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407a2, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 590.452171] BTRFS error (device loop2): open_ctree failed 22:53:56 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dcb00000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dddd0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 590.580826] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 590.600825] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:56 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) 22:53:56 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000400004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 590.629194] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 590.645494] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:56 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00061000", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:56 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xf) 22:53:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000070000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 590.850310] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 590.857557] BTRFS error (device loop2): superblock checksum mismatch [ 590.871267] BTRFS error (device loop2): open_ctree failed 22:53:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000004c0)="7b79933d6a6ed57b687671c2c57b72b85eaec16bc354950a7555ebbd05ec59f2e12990", 0x23}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240)=0x4800, 0x20000102000007) 22:53:56 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000dcb6000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adcdd0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:56 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000080004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:56 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x2) 22:53:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4078f, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 591.011762] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 591.050397] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000040000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:56 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 591.090763] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 591.104837] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bdd090800000000570d6bc3000020e9a90f7908583b9ed554fa07424ada75af1f02acc7cbbcd7a071fb35331ce39c5ac729d101132e88f073210ff397f9d71900000000") flistxattr(r1, &(0x7f00000002c0)=""/162, 0xffffffffffffff41) 22:53:57 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xf0ffffff00000000) [ 591.248566] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 591.255886] BTRFS error (device loop2): superblock checksum mismatch [ 591.283372] BTRFS error (device loop2): open_ctree failed 22:53:57 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00033044000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 591.294100] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 591.301532] BTRFS error (device loop2): superblock checksum mismatch [ 591.310567] BTRFS error (device loop2): open_ctree failed [ 591.320538] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 591.327972] BTRFS error (device loop2): superblock checksum mismatch [ 591.344441] BTRFS error (device loop2): open_ctree failed 22:53:57 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000700000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffffff87e000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffff97000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407bf, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 591.466422] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 591.482225] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') setns(r1, 0x0) [ 591.525813] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 591.543728] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:57 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:57 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xffffff7f) 22:53:57 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adcb90000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 591.646213] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 591.653500] BTRFS error (device loop2): superblock checksum mismatch [ 591.672403] BTRFS error (device loop2): open_ctree failed 22:53:57 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000000000004c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000480000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000001fffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:57 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xf000000) 22:53:57 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000003a00010200000000000000000aff0000"], 0x1}, 0x1}, 0x0) recvmmsg(r1, &(0x7f0000004780)=[{{0x0, 0x0, &(0x7f0000000d00), 0x0, &(0x7f0000000d80)=""/82, 0x52}}, {{&(0x7f0000000e00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000000e80)=""/33, 0x21}, {&(0x7f0000000f80)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, &(0x7f0000004900)={0x77359400}) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 591.945626] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 591.960774] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:53:57 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00066800", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0xa00, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 592.002640] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 592.031700] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 592.039059] BTRFS error (device loop2): superblock checksum mismatch [ 592.076834] BTRFS error (device loop2): open_ctree failed 22:53:57 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000034000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:57 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000001000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ddd8000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:58 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x1000000) 22:53:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a001fffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:58 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40796, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 592.489183] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 592.496505] BTRFS error (device loop2): superblock checksum mismatch 22:53:58 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x300) [ 592.532555] BTRFS error (device loop2): open_ctree failed [ 592.544750] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 592.552230] BTRFS error (device loop2): superblock checksum mismatch [ 592.564662] BTRFS error (device loop2): open_ctree failed [ 592.574531] BTRFS error (device loop2): unsupported checksum algorithm 3786 22:53:58 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000dcaf000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:58 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000004000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 592.582128] BTRFS error (device loop2): superblock checksum mismatch [ 592.614866] BTRFS error (device loop2): open_ctree failed 22:53:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a05000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000009710000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:58 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xffffff9e) [ 592.827329] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 592.834659] BTRFS error (device loop2): superblock checksum mismatch [ 592.842472] BTRFS error (device loop2): open_ctree failed 22:53:58 executing program 3: 22:53:58 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:58 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000017e000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0xfffffff5, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:58 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ffffff9700000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a48000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00001000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:58 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x200000000000000) 22:53:59 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xffffff7f00000000) [ 593.287160] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 593.294537] BTRFS error (device loop2): superblock checksum mismatch [ 593.304781] BTRFS error (device loop2): open_ctree failed [ 593.315167] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 593.322480] BTRFS error (device loop2): superblock checksum mismatch 22:53:59 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363af4000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:59 executing program 3: [ 593.382226] BTRFS error (device loop2): open_ctree failed [ 593.416616] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 593.423992] BTRFS error (device loop2): superblock checksum mismatch 22:53:59 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000002300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40775, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 593.451354] BTRFS error (device loop2): open_ctree failed [ 593.465132] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 593.472767] BTRFS error (device loop2): superblock checksum mismatch [ 593.488168] BTRFS error (device loop2): open_ctree failed 22:53:59 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x100000000000000) 22:53:59 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffffffffff07000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ddda000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x5) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x2f5) 22:53:59 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x4506000000000000) 22:53:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a7a000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:59 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006006c00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:53:59 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fbffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:59 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a7a000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 593.784253] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 593.791587] BTRFS error (device loop2): superblock checksum mismatch [ 593.804998] BTRFS error (device loop2): open_ctree failed 22:53:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffffe000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:59 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc0405519, &(0x7f0000001000)) 22:53:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407ae, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:53:59 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xf00) 22:53:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0a000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:53:59 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 594.119398] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 594.126730] BTRFS error (device loop2): superblock checksum mismatch [ 594.153058] BTRFS error (device loop2): open_ctree failed [ 594.162621] BTRFS error (device loop2): unsupported checksum algorithm 3786 22:54:00 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00008cffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:00 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000001f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 594.169970] BTRFS error (device loop2): superblock checksum mismatch [ 594.192180] BTRFS error (device loop2): open_ctree failed 22:54:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000080), 0x7ffff000) 22:54:00 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x34000) 22:54:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:00 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x70, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:00 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00004c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:00 executing program 3: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) semget(0x1, 0x0, 0x458) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000000300)={&(0x7f0000002100)=""/4096, 0x1000}) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000040)={0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e24, 0x4, 'wlc\x00', 0x2, 0xffffffff, 0x1c}, 0x2c) [ 594.496857] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 594.504310] BTRFS error (device loop2): superblock checksum mismatch [ 594.517298] BTRFS error (device loop2): open_ctree failed 22:54:00 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x300000000000000) 22:54:00 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00740000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000dddd000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363aea1b0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:00 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xf000) 22:54:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)="6f6f6d5f61646a00000026e7080900000000") sendfile(r1, r0, &(0x7f0000000040)=0x5d, 0x79ffffffffffff) [ 594.816067] EXT4-fs error: 13 callbacks suppressed [ 594.816096] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40765, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:00 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000f6ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:00 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600f83f", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 594.866751] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 594.883779] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 594.891178] BTRFS error (device loop2): superblock checksum mismatch [ 594.907524] BTRFS error (device loop2): open_ctree failed 22:54:00 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363af6ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afdfdffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000ffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 595.058393] syz-executor3 (12108): /proc/12104/oom_adj is deprecated, please use /proc/12104/oom_score_adj instead. 22:54:00 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x858, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) 22:54:00 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x645) 22:54:01 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000000000001c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 595.183631] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 595.214580] EXT4-fs: 14 callbacks suppressed [ 595.214595] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 595.221636] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 595.236984] BTRFS error (device loop2): superblock checksum mismatch [ 595.263975] BTRFS error (device loop2): open_ctree failed [ 595.280391] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:01 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000800000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 595.337179] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000fffffffd0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:01 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006f5ffff", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:01 executing program 3: 22:54:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000007a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407b6, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:01 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xf0ffffff) 22:54:01 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 595.587002] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 595.594308] BTRFS error (device loop2): superblock checksum mismatch [ 595.616216] BTRFS error (device loop2): open_ctree failed 22:54:01 executing program 3: 22:54:01 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a60000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:01 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x4506) 22:54:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000048000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 595.698746] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 595.733500] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00006000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:01 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006710900", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 595.765761] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 595.798835] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:01 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00006c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0xa, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:01 executing program 3: 22:54:01 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xf0) 22:54:01 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000001c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 596.000227] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 596.007644] BTRFS error (device loop2): superblock checksum mismatch [ 596.023015] BTRFS error (device loop2): open_ctree failed 22:54:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000200000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 596.106111] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 596.134179] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 596.160242] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:02 executing program 3: 22:54:02 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x400300) 22:54:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffffffffff07000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407b4, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:02 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000001000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 596.210390] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:02 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 596.286376] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 596.293670] BTRFS error (device loop2): superblock checksum mismatch [ 596.311697] BTRFS error (device loop2): open_ctree failed 22:54:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ea240000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:02 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adcb60000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:02 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x3) 22:54:02 executing program 3: 22:54:02 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000010000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 596.498309] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 596.538119] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000008000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:02 executing program 3: [ 596.590997] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 596.608672] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:02 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xfffffffffffff000) 22:54:02 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 596.660558] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 596.667939] BTRFS error (device loop2): superblock checksum mismatch [ 596.683799] BTRFS error (device loop2): open_ctree failed 22:54:02 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffffff87e000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407b8, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:02 executing program 3: 22:54:02 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x9effffff00000000) 22:54:02 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000c0ed0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adde30000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00030000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 597.056857] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 597.074233] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 597.081558] BTRFS error (device loop2): superblock checksum mismatch [ 597.091956] BTRFS error (device loop2): open_ctree failed [ 597.101499] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:02 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000dcb2000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:02 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40767, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:03 executing program 3: 22:54:03 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x45060000) 22:54:03 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ffffff97004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000003f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00090000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:03 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000004c0)="7b79933d6a6ed57b687671c2c57b72b85eaec16bc354950a7555ebbd05ec59f2e12990df186d3a", 0x27}], 0x1, 0x81806) sendfile(r0, r1, &(0x7f0000000240)=0x4800, 0x20000102000007) 22:54:03 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x3000000) [ 597.459495] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 597.466819] BTRFS error (device loop2): superblock checksum mismatch [ 597.498430] BTRFS error (device loop2): open_ctree failed 22:54:03 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:03 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adcad0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4079d, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:03 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffdfd000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000001680)="7dcc971f97be4f8e9bb46c80a581a440c55e3c5e09881e9655e0b8", 0x1b}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000240)=0x4800, 0x20000102000007) 22:54:03 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x40030000000000) 22:54:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffffffffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 597.896318] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 597.903667] BTRFS error (device loop2): superblock checksum mismatch [ 597.912511] BTRFS error (device loop2): open_ctree failed 22:54:03 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006000020", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:03 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00340000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:03 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00001c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00004000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:03 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0xf00000000000000) 22:54:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000002980)='task\x00') flistxattr(r1, &(0x7f00000002c0)=""/162, 0xffffffffffffff41) 22:54:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407b1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363af5ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:04 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ab3dc0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 598.265981] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 598.273263] BTRFS error (device loop2): superblock checksum mismatch [ 598.286394] BTRFS error (device loop2): open_ctree failed 22:54:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00480000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:04 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fcfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:04 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006fcfdff", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:04 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x1000000000000c, 0x80000000001, 0x1000000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 22:54:04 executing program 3: semop(0x0, &(0x7f0000000080)=[{0x2, 0xffff}, {}], 0x2) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x51d}, {0x2, 0x2}], 0x2, &(0x7f0000000040)) semctl$IPC_RMID(0x0, 0x0, 0x10) 22:54:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00680000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40770, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 598.626143] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 598.633416] BTRFS error (device loop2): superblock checksum mismatch [ 598.651483] BTRFS error (device loop2): open_ctree failed [ 598.660170] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 598.667489] BTRFS error (device loop2): superblock checksum mismatch 22:54:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ea1d0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 598.680802] BTRFS error (device loop2): open_ctree failed [ 598.712232] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 598.719527] BTRFS error (device loop2): superblock checksum mismatch 22:54:04 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:04 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xffffffffffffffff) socket(0x1000000000000b, 0x2, 0x100000000007ffd) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0x1e5, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="88000000210002002cbd7000fbdbdf250a1481d4060000ffe900000005000100080006000800000008000f00000000001400010000000000000000000000000000000000080017004e224e2214000100fe80008007005f746f5f62726964676500140000e00000190000000000000000000000000000000000000000020000000000000000000000"], 0x88}, 0x1}, 0x0) 22:54:04 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000680000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 598.746010] BTRFS error (device loop2): open_ctree failed 22:54:04 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000006004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000074000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000060000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:04 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x10000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e21, 0x8000, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x400}, @in6={0xa, 0x4e21, 0xffffffffffffffff, @ipv4={[], [0xff, 0xff]}, 0x2}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000300)={r3, 0x80000001}, &(0x7f0000000340)=0x8) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000100)={0x11, 0x1, r4, 0x1, 0xfff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="280000001c0007fc3174642c187371b2abd859787f81eecadb30f872bb62da48e6c92530e7a3a7f77e0f00000000000000000700000058ce6f955f65637ad526c2495840c70dbe8d4fe01e1820f8bb98cf2841719eaeeaef80070700fcfe0482a2cd66eaaa56aec2d0a84d2bc2924e5754e8bfc26015e17ca3f435218f075535784293fb3d44f1c918522da901fa329cf495738d8182e1e9da13334d0555c720fbe72bac44e6beddd546d5ba62b9f7", @ANYRES32=r4, @ANYBLOB="3e090101ca39993b5315c72caaaa010f083320692da8cc4c6416f8b6ef140b9cf5cefa1b1cf99aae282efd0165829ea3fc56193dba9965821f9613c1202109c275eb379388ed02a7cf7833b447671e2a3cd1e937dd0470c10675da4f41ffac5896606bf342acb3b85499b53c59ebeb1c60f7089c477382a67e68274c4df5d532774b90e862641f5a36cc8f659b551bf052474bb01a8a1834f268ead337b6bb1b5a86d991c7a5edd20d4bbb32323d251cb7e40025d21705aeab5c1091bc09e587d9ce1e593fd89b876d"], 0x28}, 0x1}, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) [ 599.065122] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 599.072407] BTRFS error (device loop2): superblock checksum mismatch [ 599.088182] BTRFS error (device loop2): open_ctree failed [ 599.105991] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 599.113295] BTRFS error (device loop2): superblock checksum mismatch 22:54:05 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407b5, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 599.152903] BTRFS error (device loop2): open_ctree failed 22:54:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000100004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:05 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dcb10000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000010000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 599.258675] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. [ 599.287443] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. 22:54:05 executing program 3: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) quotactl(0x2080000201, &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000040)) 22:54:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000060000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:05 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) r3 = dup2(r0, r1) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000080)={0x6, 0x5}) [ 599.440660] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 599.447969] BTRFS error (device loop2): superblock checksum mismatch [ 599.465303] BTRFS error (device loop2): open_ctree failed [ 599.473440] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 599.480704] BTRFS error (device loop2): superblock checksum mismatch [ 599.498638] BTRFS error (device loop2): open_ctree failed 22:54:05 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000068000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a09000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:05 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) accept$inet(r1, &(0x7f0000000080)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 22:54:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000000000006c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:05 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006ffffff", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000dddc000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000140)="000000000000000000000000000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6287c64dbea37a", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, 0x81806) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000480), 0x2000010200fff0) pipe2(&(0x7f00000000c0), 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000140)={0x0, 0x0, 0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'syz_tun\x00'}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000400), 0x8) 22:54:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407be, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:05 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000000c0)={{0x0, 0x47fe}, 'port0\x00', 0x51, 0x100000, 0x6, 0x9, 0x10001, 0x3f, 0x3, 0x0, 0x4, 0x38000000000000}) r2 = socket(0x1000000000000a, 0x80000000001, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000280)={@local, @empty, 0x0}, &(0x7f00000002c0)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={"69706492163b4d01b94a2500", r3}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r4, @ANYBLOB='\t\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x28}, 0x1}, 0x0) [ 599.821842] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 599.829340] BTRFS error (device loop2): superblock checksum mismatch [ 599.839018] BTRFS error (device loop2): open_ctree failed [ 599.849451] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 599.856920] BTRFS error (device loop2): superblock checksum mismatch [ 599.870017] BTRFS error (device loop2): open_ctree failed [ 599.885916] EXT4-fs error: 14 callbacks suppressed [ 599.885930] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 599.886018] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 599.910939] BTRFS error (device loop2): superblock checksum mismatch 22:54:05 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000dcb8000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 599.932699] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 599.968366] BTRFS error (device loop2): open_ctree failed 22:54:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffff97000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:05 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000fffffdfd0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 600.139709] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. [ 600.163125] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. 22:54:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) r2 = signalfd(r0, &(0x7f0000000140), 0x8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}, r3}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000780)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000740)={&(0x7f00000002c0)=@newlink={0x458, 0x10, 0x2, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, 0x10, 0x40050}, [@IFLA_LINKINFO={0x240, 0x12, [@IFLA_INFO_SLAVE_KIND={0x8, 0x4, '^\x00'}, @IFLA_INFO_SLAVE_KIND={0x14, 0x4, '%uservboxnet0#@\x00'}, @IFLA_INFO_DATA={0x88, 0x2, "45baa0b9d1c715f24b34b7bb1d58a0b9f7415cb1abcbe98bd4372849f8cb699b5b55b28a63d7b0233a2810a9a5063ab003763beed9b48060aa5a4ba1f29ed7980bb1de3ee90e89308fc3a641ad04bd212fb93bb37906ab3314e2efcd54730da995d8be3b183faec3ec40cb7579c7705f35ae595b0537e78056cab5e1c972077c9d6d9c12"}, @IFLA_INFO_SLAVE_KIND={0x14, 0x4, 'bridge_slave_0\x00'}, @IFLA_INFO_DATA={0xa4, 0x2, "1a0f7639ba507cdeab1ca7c0710950e690eedaa60f859cb8783aa70c6788cbf63eedd98f2643d78a9a26bfdb7f8abf72a157b3cb161345e0b99519335dd6d39e867d602fd8e3fdeb0c78e6314209e185803e7ef78ec58ab5c6181a8372585e812edde3944c46ebd0392335c483de07e75f830d2b33b5ebf97a08ed23f24e64183f3bc72d9beea721cc5a0da3198d58af7a06f8722b2fbb5808fd4a0d210e"}, @IFLA_INFO_DATA={0xe0, 0x2, "dc96bd41119cbaa3c988708f08e395330d297d03d047883fe512dcdf474098b9cda6432f4ad1a6586882f222e0e2da1ff76c8cacbe7e340c703c9ae8a0afaa22659d3a92086f341f35f334dc8f60143f5346027e99a54ebc7e77ca8c26dba576080847f3a025e9e7bfc8538f4cd892c5443bd1c386b9220cf795a9972fdc665602d5b023e2952c75a757aef0c2cd67a1e7041bec3915c5b66c4eec9387ea78c215685583f437f8f059a18445018848058dc0641bce2cb67372b3f9a1dbb6efe0def4369715c8606560c4407420ea715d52ba6dd0d9b8ea5d8e"}]}, @IFLA_IFNAME={0x14, 0x3, 'nr0\x00'}, @IFLA_MAP={0x24, 0xe, {0x6, 0x5, 0x7f, 0xffffffff, 0xfffffffffffffff8, 0x7}}, @IFLA_EVENT={0x8, 0x2c, 0x81}, @IFLA_WEIGHT={0x8, 0xf, 0x8}, @IFLA_LINKINFO={0xf0, 0x12, [@IFLA_INFO_SLAVE_DATA={0x9c, 0x5, "b269934fc0222bb91180b91e1eb795dcdc96851a3c57c12a4069c187ff16cb0622159d950f88c01e24c77405725f293098e46e1499953c4f0c46a4ffdae6b83c2526bcd7d8f41a3107d5ee5e21bf820ca45717b771bde55981b38210e03d9533f82a3781274669a6e0dfff520327d0cd52841f0f7ed37349f8f3f340f4d686fe40dcac11cb34aa76e259b8ba54678ee60672dd0398"}, @IFLA_INFO_KIND={0x14, 0x1, 'bridge_slave_0\x00'}, @IFLA_INFO_DATA={0x28, 0x2, "e86e20bca3366ce952a05a8b8770d22162d30a4a10e5d2f1a0a2587cc67ab497ad"}, @IFLA_INFO_KIND={0x14, 0x1, 'bridge_slave_0\x00'}]}, @IFLA_XDP={0x98, 0x2b, [@typed={0xc, 0x69, @u64=0x20}, @typed={0x8, 0x91, @fd=r2}, @nested={0x80, 0x94, [@typed={0x8, 0x63, @u32=0x4a1}, @generic="d51ab7c05cc095b55f9f785ab3a45e044811496b75eadeee080ac7157e9d06bf05586c8a5742ed5a5fba9d6c79bf64ed5df654bb020803eef8707ab5d44b4fedb9126f95d2cc6dcd49263d1e8fa08dae7b3b01fc08d830c65e334feab1b58ad8721872a802eb47f29bac3aadeb7fe7625d51"]}]}, @IFLA_CARRIER={0x8, 0x21, 0x100}, @IFLA_PHYS_PORT_ID={0x1c, 0x22, "f4edacd52bb1a5ab6caac2f03366fa2e763ffff5b771"}, @IFLA_IFALIASn={0x4, 0x14}]}, 0x458}, 0x1, 0x0, 0x0, 0x81}, 0x40) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0xc) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000840)=0x1, 0x4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r4, 0x2, 0x1, [0x1]}, 0xa) close(r2) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000880)={0xff}, 0x4) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f00000007c0)=@dstopts={0x0, 0xa, [], [@jumbo={0xc2, 0x4, 0x1000}, @generic={0x7ff, 0x49, "92d39e9f31aa8366e7934d8a006eb9b9cf68c5ca53e0591849b36aa8e7516043e8f2bb5def96a7b8106251ce1bc66d1abe5f08fd3cc8994d509085a1b0220f071eb09bdb426c85f88e"}, @padn={0x1, 0x1, [0x0]}]}, 0x60) [ 600.184609] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 600.192107] BTRFS error (device loop2): superblock checksum mismatch [ 600.215532] BTRFS error (device loop2): open_ctree failed 22:54:06 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a003f0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40790, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:06 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 600.361959] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 600.400553] EXT4-fs: 14 callbacks suppressed 22:54:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ad8dd0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 600.400567] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 600.434947] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 600.456794] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:06 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006000500", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a18ea0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x8, 0x1, 0x202, 0x6, 0xaee, 0x7, 0x6, 0x9, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r3, 0x3f}, 0x8) 22:54:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 600.568700] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 600.576013] BTRFS error (device loop2): superblock checksum mismatch [ 600.605273] BTRFS error (device loop2): open_ctree failed 22:54:06 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000008000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:06 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000001100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a04000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="3e0900000a000200aaaaaa4ab5309a0047a2b8644a4f62dabaf649ebac5c95ff19da4d44af2845a4d1af1e00ad3a208fb167de70d5314f43b27a64fc3219602522bf412956d9308c407e41628f3fcda9a17665ac8ec2bf96c460a2a6c8d2cef82d3af32e"], 0x28}, 0x1}, 0x0) [ 600.779693] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 600.841229] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffffe4000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 600.908749] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 600.922806] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:06 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006004c00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 601.079334] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 601.086646] BTRFS error (device loop2): superblock checksum mismatch 22:54:06 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x7) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x20, 0x284800) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0x36f, 0x0, 0x3}]}) 22:54:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 601.126348] BTRFS error (device loop2): open_ctree failed [ 601.135013] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 601.142418] BTRFS error (device loop2): superblock checksum mismatch 22:54:07 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00400000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 601.210608] BTRFS error (device loop2): open_ctree failed [ 601.243369] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 601.250976] BTRFS error (device loop2): superblock checksum mismatch 22:54:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4076b, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 601.314533] BTRFS error (device loop2): open_ctree failed [ 601.326746] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 601.334194] BTRFS error (device loop2): superblock checksum mismatch 22:54:07 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000fffffff5004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:07 executing program 6: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x400, 0x0) ppoll(&(0x7f00000000c0)=[{r0, 0x220}], 0x1, &(0x7f0000000100), &(0x7f0000000140)={0x5}, 0x8) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r3, @ANYBLOB="3e0900000a001200aabcaaaaaaaa0000"], 0x28}, 0x1}, 0x0) [ 601.353564] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 601.382617] BTRFS error (device loop2): open_ctree failed 22:54:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a001c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 601.428433] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a003f0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 601.483848] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 601.491175] BTRFS error (device loop2): superblock checksum mismatch [ 601.502412] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 601.516646] BTRFS error (device loop2): open_ctree failed 22:54:07 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a001c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 601.560879] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:07 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:07 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$setpipe(r0, 0x407, 0xcb8) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000ebb89c5ebd9e6276edf60700ad139b73f4c4b68ed34ef127de278d3f36689b071d20dadb022409c5e20165a9c6a6e8cc24e4df02f073a3e669e47dd7a01d1a41874796bf253fccff6b978d6919d527d5f32c9f4bd6f44f31ac548739c4968aa2f6ccb96fc6fdac32ce1d371964c3de256e631f0f68dcdc515988b970", @ANYRES32=r2, @ANYBLOB="aa0000"], 0x28}, 0x1}, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000280)={{0x2, 0x7, 0x2, 0x6, 'syz0\x00', 0x8000}, 0x1, [0xf605, 0x2, 0x0, 0x4, 0x8, 0x5, 0xffffffffffff8000, 0x7ff, 0x17, 0x89b5, 0x101, 0x3, 0x1, 0x0, 0xffffffff, 0xfffffffffffff001, 0x1dd, 0x100, 0x7c, 0x4, 0x4, 0x7035, 0x4, 0x100000001, 0x4, 0x299e, 0x0, 0xc279, 0x10000, 0x8, 0x0, 0x400, 0x18000000000000, 0xc1, 0x0, 0x7fff, 0x6eef, 0xfff, 0x7fffffff, 0xfffffffffffffe96, 0x0, 0x6, 0x101, 0x7f, 0x4, 0x3, 0x8, 0xffff, 0x9, 0x6, 0x4, 0x2, 0x17, 0x9, 0x1, 0x2e5f, 0x401, 0x0, 0x2, 0x7ff, 0x9, 0x3, 0x1f, 0xf21, 0xdb, 0xfff, 0xff, 0x5, 0x7f, 0x9, 0x6, 0x1ff, 0x5, 0x0, 0x5, 0xe07, 0x0, 0x1f, 0x3, 0x8, 0x3ff, 0x101984b6, 0x100000000, 0xbf4, 0x401, 0x2e, 0x80000000, 0x1ff, 0x8, 0x7, 0xffffffff, 0x8, 0x0, 0x30, 0x4, 0x0, 0x7, 0x5, 0x1, 0x0, 0x1ff, 0x8369, 0x9627, 0x10001, 0x7fff, 0x4, 0xf10, 0x9a94, 0x4, 0x2, 0x3, 0x3, 0x2e0e, 0x101, 0xff, 0x800, 0x3, 0x0, 0x400, 0x5, 0x7f, 0x7, 0x6, 0x8, 0x8, 0x800100000, 0x5, 0x80c8], {r3, r4+10000000}}) 22:54:07 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000006800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffc000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffdfc000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 601.744021] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 601.751297] BTRFS error (device loop2): superblock checksum mismatch [ 601.768658] BTRFS error (device loop2): open_ctree failed [ 601.781306] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. 22:54:07 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a017e0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 601.803021] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. 22:54:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407b0, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:07 executing program 6: r0 = socket$netlink(0x10, 0x3, 0xe) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="3e09f60000007e7be68e2f37c7e378aa0000"], 0x28}, 0x1}, 0x0) recvfrom$inet6(r1, &(0x7f0000000380)=""/236, 0xec, 0x40000002, 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000080)={@local={0xfe, 0x80, [], 0xaa}, r2}, 0x14) [ 601.845547] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 601.883108] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:07 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ffffffffffff0700004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 601.929284] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 601.962077] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:07 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006002000", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffff8c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a09710000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 602.073442] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 602.080880] BTRFS error (device loop2): superblock checksum mismatch 22:54:07 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="3e0900000a000200aaaac153c51e7728"], 0x28}, 0x1}, 0x0) [ 602.133697] BTRFS error (device loop2): open_ctree failed 22:54:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:08 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a97ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000009004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 602.247632] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4078c, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:08 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="3e0900000a000200aaaaaaaaaaaa00000de25426c37d74bf9de0e68211a312206ef85cc55b31d9af941db5b102066ef3319abb8b676f0efcaa8e68b304a0a1c38d846d22132d91272f35e0b50eacf3"], 0x28}, 0x1}, 0x0) [ 602.305761] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000fffffff40000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:08 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00060900", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 22:54:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adde10000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 602.446014] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 602.453307] BTRFS error (device loop2): superblock checksum mismatch [ 602.461398] BTRFS error (device loop2): open_ctree failed 22:54:08 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffffffffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000001f00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:08 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="3e0900000a000200aaaaaaaaaaaa0000e9681c5f7529d370561bffdc7fa3b7d7f605320884f2a5fdbec10068835e792aaab4dc202b0d60cd894ac87c8d55c485f4e894449ce374e2d3e2f8f4568d0b07efbde7b65a670f59"], 0x28}, 0x1}, 0x0) 22:54:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffffffffff07000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 22:54:08 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ae0dd0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x14, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 602.758387] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 602.765750] BTRFS error (device loop2): superblock checksum mismatch [ 602.774230] BTRFS error (device loop2): open_ctree failed [ 602.784552] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 602.791982] BTRFS error (device loop2): superblock checksum mismatch 22:54:08 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x1000000000000a, 0x4000000005311) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:08 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000ffffff8c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 602.809175] BTRFS error (device loop2): open_ctree failed 22:54:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 22:54:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000001f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:08 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r3 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x46c, r3, 0x600, 0x70bd2c, 0x25dfdbfc, {0x1}, [{{0x8, 0x1, r2}, {0x78, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x7c, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xa7}}}]}}, {{0x8, 0x1, r2}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x43e}}}]}}, {{0x8, 0x1, r2}, {0x140, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}]}}]}, 0x46c}, 0x1, 0x0, 0x0, 0x8001}, 0x1) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="3e0900000a0002000000000000000000"], 0x28}, 0x1}, 0x0) 22:54:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 603.083754] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 603.091155] BTRFS error (device loop2): superblock checksum mismatch 22:54:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40769, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:08 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000023000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000002000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 603.138338] BTRFS error (device loop2): open_ctree failed [ 603.160963] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 603.168623] BTRFS error (device loop2): superblock checksum mismatch 22:54:09 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000007a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 603.199958] BTRFS error (device loop2): open_ctree failed 22:54:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000000fff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:09 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x7e0a3a8cab6629fd, r2, 0x7) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:09 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000003f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000dde4000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:09 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 603.507730] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 603.515084] BTRFS error (device loop2): superblock checksum mismatch 22:54:09 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00680000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40798, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 603.550292] BTRFS error (device loop2): open_ctree failed 22:54:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:09 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x2, 0x10, 0x5, 0x8000}]}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:09 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00006800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 603.846200] BTRFS error (device loop1): superblock checksum mismatch [ 603.877097] BTRFS error (device loop1): open_ctree failed [ 603.894986] BTRFS error (device loop1): superblock checksum mismatch 22:54:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:09 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:09 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00c0ffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:09 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x14040004) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000000)=0xffffffffffff0001, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}], 0x1c) sendto$inet6(r2, &(0x7f00000007fa)="97", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x4e25, 0x0, @loopback={0x0, 0x1}, 0x2}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r5, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adde40000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 603.935570] BTRFS error (device loop1): open_ctree failed 22:54:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a02000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407ad, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:09 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000fffffe00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 604.219681] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 604.227090] BTRFS error (device loop2): superblock checksum mismatch [ 604.236854] BTRFS error (device loop2): open_ctree failed 22:54:10 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000340000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:10 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', r2}) r4 = fcntl$dupfd(r1, 0x406, r0) write$FUSE_LSEEK(r4, &(0x7f0000000080)={0x18, 0xeb3b1fd61bcdce5f, 0x5, {0x1}}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000dfed0d118421455d060f66d00cfa2c5fc6452ce6d50ec79fa2528469788968b75a4f2e494b12245422385a8875", @ANYRES32=r3, @ANYBLOB="3e0900000a000200aaaaaaaaaaaa0000"], 0x28}, 0x1}, 0x0) 22:54:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ea220000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a02000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:10 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006001f00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 604.532383] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 604.539841] BTRFS error (device loop2): superblock checksum mismatch [ 604.572274] BTRFS error (device loop2): open_ctree failed 22:54:10 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000090000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:10 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) write$binfmt_elf64(r1, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x2, 0x20, 0x0, 0x10001, 0x3, 0x3f, 0xfffffffffffffffc, 0x12f, 0x40, 0x45, 0x0, 0x3, 0x38, 0x2, 0x1, 0xff, 0xa000000000000000}, [{0x1, 0x9, 0x9, 0x4, 0x1, 0x1, 0x4, 0x8}], "b7277d8f344dd47d27c5343932eb32b6fa045bc8f38a57fc8491ac7d19f005153b09497d4f46dbab"}, 0xa0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)={r1}) 22:54:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ea18000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:10 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006007a00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffdfd000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") writev(0xffffffffffffffff, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:54:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4078d, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000100000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:10 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x121000, 0x0) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000140)) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10480, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x2b, 'io', 0x20}, {0x2d, 'pids', 0x20}, {0x2d, 'rdma', 0x20}, {0x2d, 'cpu', 0x20}, {0xa60bc2e2cc6531d2, 'io', 0x20}, {0x2f, 'rdma', 0x20}, {0x2b, 'cpu', 0x20}, {0x2d, 'cpu', 0x20}]}, 0x29) pipe2(&(0x7f00000001c0), 0x4800) 22:54:10 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adcb10000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 604.950424] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 604.957731] BTRFS error (device loop2): superblock checksum mismatch [ 604.964953] BTRFS error (device loop2): open_ctree failed [ 604.977005] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 604.984538] BTRFS error (device loop2): superblock checksum mismatch [ 605.007288] BTRFS error (device loop2): open_ctree failed 22:54:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") writev(0xffffffffffffffff, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:54:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363aea1a0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 605.050531] EXT4-fs error: 14 callbacks suppressed [ 605.050547] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00230000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 605.091139] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000004c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:10 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600c000", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407b2, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:11 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) r2 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") writev(0xffffffffffffffff, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 605.448518] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 605.455824] BTRFS error (device loop2): superblock checksum mismatch [ 605.467802] BTRFS error (device loop2): open_ctree failed 22:54:11 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a006c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:11 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fdfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00680000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a97ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 605.641432] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:11 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="3e0900000100000001000080201a49aaaaf6ff6142c83b4d40661bb05e7fa5b1f394ab8fdb780dfba36704"], 0x28}, 0x1}, 0x0) [ 605.684954] EXT4-fs: 14 callbacks suppressed [ 605.684968] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 605.745712] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 605.761602] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:11 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:11 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r0, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:54:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40776, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 605.977379] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 605.984808] BTRFS error (device loop2): superblock checksum mismatch [ 605.992952] BTRFS error (device loop2): open_ctree failed 22:54:11 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ab9dc0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:11 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='bridge_slave_0\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000100)) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 606.066558] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. 22:54:11 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000008004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000090000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:12 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r0, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 606.264813] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 606.285155] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:12 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006000009", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 606.314676] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 606.338516] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:12 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4079a, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:12 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000080000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 606.435512] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 606.442895] BTRFS error (device loop2): superblock checksum mismatch [ 606.450999] BTRFS error (device loop2): open_ctree failed 22:54:12 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r0, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:54:12 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000007400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ea1d000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adde20000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:12 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) accept$packet(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bridge_slave_0\x00', r2}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="28000036001c00070f000000000000000007000000", @ANYRES32=r3, @ANYBLOB="3e0900000a000200aaaaaaaaaaaa0000"], 0x28}, 0x1}, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000100)=""/71) [ 606.736759] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 606.753439] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 606.787607] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 606.805848] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:12 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r0, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:54:12 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00060600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 606.848290] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 606.855643] BTRFS error (device loop2): superblock checksum mismatch [ 606.864517] BTRFS error (device loop2): open_ctree failed 22:54:12 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dcb80000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4079c, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:12 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fffffff500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ea22000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:12 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000340)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = memfd_create(&(0x7f0000000080)='bridge_slave_0\x00', 0x2) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000280)="02b0842bede052a1f650e53154014a93f862278b3312b2a26408a777a87fff7a560cf5edb04ce49470f98964b1ba43246c50605b96ba37a1965630f5a50efdd0dd2a335a6d1f29a78eb90f6fc35b4071d759e4cc1d41219d82c07c1fc6dee8351859c03b5ad7785f18712bea020f794a4266194773429e2f8cf49d2cd013a18d684fd832a5e0c1b30ac8d9fe16e778002a7f6478fd44ba042b171c21c7033278f80ee72c1ceceb8dd1f1954deb21ade0a017db10907b02d36d699887d963") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x201, 0x0) pipe2(&(0x7f00000001c0), 0x800) r3 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r4, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a23000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:13 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r0, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 607.213572] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 607.230311] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 607.254826] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 607.271622] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:13 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006c000", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 607.312126] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 607.319434] BTRFS error (device loop2): superblock checksum mismatch [ 607.329102] BTRFS error (device loop2): open_ctree failed 22:54:13 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dcad0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) getcwd(&(0x7f00000014c0)=""/90, 0x5a) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001380)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001440)={r3, 0x80000001, 0x1, [0xc000]}, &(0x7f0000001480)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xc7, "9cff782d3b4447a6e7a7440d20b0c355384cb9beaa35667f2f48a8452b4e4d69c3007f6484fe7763957c9002e83fb42249d63cf910202ee459d02f1dda637a464ccb5f0ad082ea91b77b7f1ed6d6d8464716531c50ff0b28accb083eb4200919dc80d6dc53a23301aedcbf53788c7a6fb85536f7507f3f275433476a82373c51f03d1547cd814014a2abcdc436a71ffdd766daecd3b4ab743a081174b312bc27445a5f0c9ecab6d08bd228d92ec6748280946331e9051f729257b039e570d16c6cadeecdfbe94b"}, &(0x7f00000001c0)=0xcf) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000280)={r4}, &(0x7f00000002c0)=0x8) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYRESOCT=r5], 0x3}, 0x1, 0x0, 0x0, 0xc0}, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) readlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=""/4096, 0x1000) 22:54:13 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000010004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:13 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r0, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:54:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a004c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407ab, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a06000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 607.649189] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 607.658982] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 607.666379] BTRFS error (device loop2): superblock checksum mismatch [ 607.686994] BTRFS error (device loop2): open_ctree failed 22:54:13 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000dcae000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 607.702635] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:13 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) socketpair(0x5, 0x800, 0x3, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000140)) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080), 0x4) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0xff, r1, 0x1, 0x6, 0x6, @random="a218cfa99ef7"}, 0x36f) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000001c0)=0x4, 0x4) 22:54:13 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:13 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000fffffffd004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a10000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ddd90000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 608.044515] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 608.051769] BTRFS error (device loop2): superblock checksum mismatch 22:54:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4076f, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 608.093683] BTRFS error (device loop2): open_ctree failed 22:54:13 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:13 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:14 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xfffffffffffff800, 0x400000) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:14 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000003004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:14 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000180000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000e087000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dde50000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:14 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:14 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000080)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x218, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 608.537724] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 608.545078] BTRFS error (device loop2): superblock checksum mismatch [ 608.552697] BTRFS error (device loop2): open_ctree failed [ 608.560689] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 608.567937] BTRFS error (device loop2): superblock checksum mismatch [ 608.576382] BTRFS error (device loop2): open_ctree failed 22:54:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a68000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:14 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 608.599456] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 608.606850] BTRFS error (device loop2): superblock checksum mismatch [ 608.636002] BTRFS error (device loop2): open_ctree failed 22:54:14 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a68000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 608.648909] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 608.656213] BTRFS error (device loop2): superblock checksum mismatch 22:54:14 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000007a00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 608.703240] BTRFS error (device loop2): open_ctree failed 22:54:14 executing program 6: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x402880) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x9, 0x100, 0x4, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) sendmmsg(r0, &(0x7f0000002b00)=[{{&(0x7f0000000380)=@hci={0x1f, r1, 0x3}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000400)="813c7f927f8a33545b42b144994ddb02155e9a8b98cdb6dec3e3a36466630f424df92bb1dfae322ac6c0a256a11bdd51e8b96b3d320483bf94534ff8233bf3aee4db5ff187b7222fbbe59ca164c036db5f0059611fd9998445", 0x59}, {&(0x7f0000000480)="00e737141a9e9197611bfacbd095ac91753a00e6634b11922dc5b17429d36aef806616d748a701c8dd76cd7a1dd8ffd83e7631b382c17cc1f5fbe5215807a879d1660dd952ce6667d2794776f9ba2423ae3da666441d46ad863fc098df99a3ca99192234240b33f0aae4ecf1d1f1bd56d6d976607564d9fb14658eb395dab33afaf43d206c4e4844167f90bc61b8392cbc00b80d995285a6c3a1c019f9bb5ec2df21624976bd8991d967fbe34fd194de65fb693a3d3806c663127376e22614d47f45093939aaeba46935d047b9d229b314", 0xd1}, {&(0x7f0000000580)="62fba42897891bb057dc70041f0a66ab5f3eb3bf1bc566f246980624a1ab5c2784e475b8b0b4be5ce21c38ba529c30fd1294f68614299f9b080097a62ef45c073b3709566024656067ba44cf744ad8459cd46f7e7314c5f38e4bf8adb7549bceb39c547c3980f47ddc94b13caf786c38b333054648f85b7e7bf569b417246b12f314b23730e35d2388f043c6dcec594e013ac1033eddba53f1570155d3395264f1cf12fcd5", 0xa5}, {&(0x7f0000000640)="8e8ae898bb7f74ce34f382d64e36167fed0b8ae6d2eb815ec38af270efd9866e05b888d42e906252d769a6580cc97d10a13dbce190ca42496b1e67b6e89d127a53e3919178ecd5baf75db74860474f3e9b0ff601d355e695afe9693478cc397510ffb681eae90974b1ec846b33a6eb90a9991e8d50734c0f007c", 0x7a}, {&(0x7f00000006c0)="8dc3b964d657705391c210b785800620f54a303ff2b03e5ee9ffece90bff27f29111adf7557acbe43b0b95586b498930340740d2978a2d7be7251565b697848edabca61949b2229e48a5da8f8f7c9877b36ec13817ad98794ede1338a31412345fa768d2f402c0a63ab4fe5b7f2c91a64a994bde28f41e9dd53b16ed40b14c4b5331048f2e7dc5c1f1d53a5029ac99d1dada4cd7f4ac63e771faf5a582b6b5", 0x9f}, {&(0x7f0000000780)="4432fca14613325fa3528e37165958d8c153cee4fe73adf7dcce09b91c87ec0693083da880d660ab29e3647d902a9ba69382fe6b25d44ee74fc54b1b6cc2914374acddf231e9a93cce4923b61b38b2788e4bca3172b8efada6e9c2814a3f0911f648aca9a3547d503094af59773ac830672ab54825290432f6bd79f2c3b80ce6585da3b5d5d652326844f52345aa1397fa477e3e0e4cf5", 0x97}, {&(0x7f0000000840)="c23bba67eeb1c8bd23f12a73fb329af18cc1c4f44b43aaa023985fe1b94740f302011473f25128682c1d1b33e552ccea0e114b370b9849884703daf49a67d42f100697b736e7066effac45e338ed111f", 0x50}], 0x7, &(0x7f0000000940)=[{0x58, 0x19f, 0xf24, "710804c601150b5bcec9b4895d9f97e9672e58b6bcfb478f9fb07796b0c749830e64814cc89089bb1f7656d4423989e4351d0af3dd8a2be44d5c2fff822c33e57b47564da2"}, {0xa0, 0x108, 0x6, "ce5b1df93f9d4310c85af39ae87c17bc95bd2c0daea98c278bfffd5083ba46e68010f8c12b28a34bd28e07eae96684e4479279ffcdc12d236642e17e98d9b6a2f008b1b5d7aa0b18533696f9b3abd6aaa818fef4df8c7922dfd170587df49036dea0c574273ed32158b44dcc8a48004ba5e7018c3d0393d8066305f9f0d0354b0950aa88821a94e79c58a71fcd5991cf"}, {0x90, 0x101, 0x27b2, "a5d8d5736a887c5021e86aef47419737735f1f132785caf40ea2fb87648140aa4018bd1852d501859c3eb583cc93e5774c03ac7daa220a426bea1ba3af6293b3383ceb7c48df8d9113f2132ad49a486a75721875a0d175cf573e30bb2f737cd9f4c173026d35a5f3ef1f7d01bd8702bdec3c2f8bc401a0aff49dda54fa"}, {0x60, 0x100, 0x9, "6423070264e9decde14ff6673dc34e19b1ddb315a9dedaccb06ac0c62f0e2af6f790f85cd4b7e9414da36d279df1b654cc21993b4f8dff14892a9d541278f23cb510183ff2b12a9ba1ca36"}, {0x28, 0x10f, 0x8, "a160f770dfc6517c39965a0378ccc33f31184d1f19d56842"}, {0x70, 0x115, 0x6, "f4a4acc33896aef75fbb86c297f275bdabca9b6f2635a543e43ed3b02812386c0b32a5fa119fe849be3f524c9caafde121638858b11a54e97477ee661db0eaaf195d9fcf968cbc6d424e0433a3eab33c884da0111a8d4f7745c7fbf9"}, {0x100, 0x1ff, 0x0, "22fd99b22791f64f6739b97376396bf5052ad9d0873b8b1b8bd319f2f259566cefe46af4aace2b90c3f8f96d4ccdb1ec988b20085523b69230f122f96c24a5ba3d408d2c36fbb0ececfa1489714c44321fcd84c5facaa161fdf5f90faf936a64a903aa8099fd054159ead0a500eb5e9c40caf1ae7b1e5b101c644ed6898e6f62b21a731f8b495df4c40de3f539641c319b320621afb126d6bbc570f37ca14757537ab1d6f2b008cb4e54dc368a8e84d9de6593074af2b23c017910eba9cd82b75f2b6476dfc3b40b7e4be1122c264d521759b0a1a4edb157ae91a95ba2d604085e8abfc5cfb808aa2cf0886ba6cde06d"}], 0x380, 0x20000005}, 0x2}, {{&(0x7f0000000cc0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @rand_addr}, 0x4, 0x0, 0x2, 0x3}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000d40)="40879294cc875d07687c4041d9fbdde0a3ffc360ba50bf9828aaa691f36e3b7be3ebf97001a810ef7160ef674a2f653c63b0218a0cc7b8b7de9188b9faaf5f87073ffefe01157af9b4b7b8d11b0923f3600129a9be90cb15c34ee0b368876641840b91f43fd0f60a2424d238d9ecc95d7805521b486e531e4e73ad7cc4bf9e3a82a7e07ac55f1c4d5cddc74718eb9aa6c3cb90902ea914299679de4172326834ca9c77cdc46d4fa27a5cfa84786d309e1916578ac8eec30786bff05973f8ee112b839e84bc", 0xc5}, {&(0x7f0000000e40)="5cb46d648637620589662f82a0a0e033fb7dd0494921e6eedd6bdd5afd782fcceaf985d4169306122fbc7a88545ffc14345a67be9ae178e972c410c739e11ccf5b265e5e953aa94083c9742a7d470810aba77a97cd915040a5db9d81ede19b7c62fbace1308e4ef92b9de184ac97929e5f56aa1962dd849b5a418e89f1114753d442b2aa7bac5405cb76eba9f2a8cf410bbdadb1261de8ba108cec2131fee2475d45b570d91f8d2d217fc499be2b3a80e2f71e395caa2631fc7c468a17161210b41c436d", 0xc4}, {&(0x7f0000000140)="582a03e486516114c3655ea646ad6c47044a36e68ebc3e0b4c042545fbc8b4ca01a2cbe7e40f97580ecb43", 0x2b}, {&(0x7f0000000f40)="40f0bedd8962394b1d793a791599c24c2fe3d514404664a63575776c2a8fab094a9a11c5e7de67ccc389eb93926ffcf7e135f3ef68a63d9741d1dc3ce4d8694467e643b9536547152a29f84dad6be3ec111a3db77df2d14fcf8c089924798717e7ca3b088aad6e789f4d0478ea71cebbf63ad730e86ed7c6dd45ae99ee072572579e847fb8261747", 0x88}], 0x4, &(0x7f0000001000)=[{0x70, 0x13e, 0x4, "4505c985f7a70fcfe29c4c30e778e1194652097f757a06d7aa87fdee8a22fbc95e104f4cdc81bd7a7007ec4664475b08100c78359a663b2af143e686838c106295ad9ed096dfcfc9ee46a5fd676b8bdf3142e38452778ebc1916"}, {0x38, 0x18d, 0x9, "af303c314326d778d94e674f18f06839c019dc883a02688b6765e78d98630d70c8f4a3734e"}, {0x98, 0x114, 0x6, "6c72516386ab6caaaaf75cf13200bc28e9db3854685c233242b464063f2bde5f3463c9df5473586c7b9fa0f318bc54342ad34584132bc9a8766fd38baeccf6d9e7ec9e1e2d4191f1ddf019402e3773684218051820c60e544b32c356757a84e88cf988eaa497af74a19f9ba39bb49ebf152a701821c04b1f55cc026713776bf641fbe16b91b865"}, {0xe0, 0x101, 0x5d5, "7fdb62a0a5fb923d2e77fd20761ce91cd5b34186a6f19025cd2d059b819c5c486407276aa323378fe2de33a40ca0f120aabc7157561decd52d22b89a79c7c78636b2317c84975941355c1634a77de4fecebd6952c2eb70370589e7310f0fa1966b400e84b748f2a37e77f742b5a77b2cf44dcd7733493ea534be3af260cd1adf9867d1e153386636673e37250223b19003550a270a17514bbd140b6f45e7755488bdddd691b89818db6d2d5517805ab71b9853712d4fabe44af7d95ba1e33187afe41420f8bda07a05d3"}, {0xa0, 0x100, 0x3, "6c4beb8d039f925a52ed2df3e0cca4f8fcf68acbc994f0481f81ac2645add09eb21d6e25590b0038f0f30d29c51d731b66d45c5bcb8b3f69fc803a1a59a2b0c4d1786bd9d8ebc7660545e87487a0546b689ded352fc43692b20857d3051f3d626c6f6da92e37f2ad154058d1d8998bd6b7a9609d615034f9622276b552a8317b8f8dd4e436c2f3d786"}, {0x38, 0x101, 0x40, "0b9d41b3d975f69524227ba2a331551889824e41e6885aa5e298802cffb916ce91"}, {0x30, 0x11b, 0x3ff, "6370e1053fa0ff9927d2e2cc349831ff83f0a0b30c2dfbd77f"}, {0x10, 0x10f, 0x8}], 0x338, 0x10}}, {{&(0x7f0000001340)=@ethernet={0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f0000002480)=[{&(0x7f00000013c0)="34940e5b51becaf01992ad058fe9904b9777b655", 0x14}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000002400)="86ee7ec9c215fb40a6c82983a3c87f254a6ff896bfa59dea771c75a025b47591ea26b24963ceba6c3f2ed70902f205b35d1d80551e03328f609e5be9742a1b87e98a37101ce8cc7fa0d6c868519c43455b2e1f6115fc8f52d185b966d1c4b131e4189a83d95582047f", 0x69}], 0x3, &(0x7f00000024c0)=[{0x58, 0x113, 0x400, "7c919d965ddaccf48d9ea6cbf0e8e6e982b80caa808a4bf3df8fd4589ce5db2816ef9b69df875d9dbe541bf27c2705dd07e2b85cfadb74d1abcfea5cb33de97f173ce7b15441d241"}], 0x58, 0x4000000}, 0xfffffffffffffffd}, {{&(0x7f0000002540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @rand_addr=0x8}, 0x4, 0x1, 0x4, 0x4}}, 0x80, &(0x7f0000002700)=[{&(0x7f00000025c0)="4a9db19b6bdad276a7565d6b7ba7213a98dad5f8aa5a91ca855f7622daf38296f6b3da686cc5bfad87156bd2bbe0a2c2bd17b87d4234332d0b5274aa428d50e08e7d588aec39a71bbd5b67c39c599a0a2741c5bd667e2c", 0x57}, {&(0x7f0000002640)="aa3a9049a414e316239f3f8fd9deef4e7ae02d", 0x13}, {&(0x7f0000002680)="450dee71c912693b650c26fa4e4970f3ae53f482671ee5135953937ee51406c45a22", 0x22}, {&(0x7f00000026c0)="a90c944f8a82e36adfa28a80d3594a04853c6135ed567193ecbc0dbc84e6bb343538ab347581ea2d57c8a9f4f81aaf538e8c64e731302f6ba0f50e8ae84f98e2", 0x40}], 0x4, 0x0, 0x0, 0x4000044}, 0x8}, {{&(0x7f0000002740)=@ipx={0x4, 0xc69c, 0xffffffffdecc6777, "051ebd7939fc", 0xcb1}, 0x80, &(0x7f0000002900)=[{&(0x7f00000027c0)="e502f1853deab758a681ecec5538e516ea5d670c53b20b9a43b4420eee3ba6001de1c29293013556eda3eeb818186f5ebd1ed23ff7a82c5d57f92ed0700c54d68bc20967bc22819017b599c7391df1a901758d75967082603fb0cc84962f4455fcf6d528a57a3612cd9787dfa2c58affd274aff417cba48697e532a3e65bfd8fedae70f4b5bb899fcbb855e7871b7b0294ae7196b17574a41f4396fd5b30f61e879a9fcb365e4260483cabe747ca988f544e6b6d223f8e9375eab87fe5671dc4cef85a40b05c476222b1803e5e9b80e8", 0xd0}, {&(0x7f00000028c0)="a7804c6dab560779ec2e40627e4458dc93bfaa1a593cebe1c138297f2e715804edf0ac476fe9abcbbf4548c177b874", 0x2f}], 0x2, &(0x7f0000002940)=[{0xa8, 0x107, 0x81000000000000, "0b2721ca88156af11095fae5fa4459e440e7d8054ce8ecca06e478b68989298b4d4ccf680f28fd2904e38caed3c7a93eeceb42db27a7a6d817ace862534b62a4f7c420a9cbebe01218a49bd88aa17d4189d51f81554c4b806eb9a9c44a62470f8b4aad598a1ac7d3ac464955fdeb21288f30bdf901e59ff848d97f5936ae727454231e510ad8594ece0eae47855cbbc2af23319a44da5b"}, {0xe8, 0x107, 0x8, "a4767fa3c94c9a8c61d3a1635b81924ea283d0f4f3a98a2050f6b51733e85c44afda3b6dae8d9552320679daba963bd4b108c63b467261349a2c9636e547758ab41bc8c998daadba03f3d067fff57ef4f6ec395f8892789e55fafad4bb97f461a08e63ab218c434605bc8608c6ef4f916249141584b987be5a394b898fef27d85db6017015ae7dad5fe2085420c4a44341536b8de14925ff47893597b0b1af0a0ed1ed346065925d30be2dd44fa88448bbe22187b51f9decac5b58dde678dd2341a7b6e114e84d80d65c5d977d637ab76d48697f9981"}], 0x190, 0x4000040}, 0x714}], 0x5, 0x4000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r4, 0x93e}, [@NDA_LLADDR={0xc, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dddf0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40794, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000003f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 608.984952] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 608.992349] BTRFS error (device loop2): superblock checksum mismatch [ 609.000834] BTRFS error (device loop2): open_ctree failed 22:54:14 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006000040", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:14 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00600000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:14 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000040004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:14 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$void(r0, 0x5451) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x15, 0xc, 0x8003) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) recvfrom(r0, &(0x7f0000000100)=""/250, 0xfa, 0x20, &(0x7f0000000280)=@can={0x1d, r3}, 0x80) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20840}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="2800000095e31c00070f000000410000000007800000", @ANYRES32=r3, @ANYBLOB="3e0900000c00ff07aaaaaaaaaaaa0060c1f5ec960aaec899698600"], 0x28}, 0x1}, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000000c0)=0x9, 0x4) 22:54:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a001fffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 609.317938] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 609.325281] BTRFS error (device loop2): superblock checksum mismatch [ 609.333642] BTRFS error (device loop2): open_ctree failed 22:54:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:15 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000023004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:15 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006003ff7", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:15 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000050000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1900, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000090000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000fffffdfc0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 609.689639] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 609.697011] BTRFS error (device loop2): superblock checksum mismatch [ 609.706003] BTRFS error (device loop2): open_ctree failed [ 609.714370] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 609.721668] BTRFS error (device loop2): superblock checksum mismatch [ 609.733760] BTRFS error (device loop2): open_ctree failed 22:54:15 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000fffffdfd004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:15 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000001c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:15 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006000900", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407a0, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 610.109611] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 610.113237] EXT4-fs error: 12 callbacks suppressed [ 610.113252] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 610.116936] BTRFS error (device loop2): superblock checksum mismatch [ 610.147419] BTRFS error (device loop2): open_ctree failed [ 610.161923] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:16 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) flistxattr(r0, &(0x7f0000000080)=""/62, 0x3e) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000280)={0x3, 0x8000, 0x1f80000, 'queue0\x00', 0x6}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000480000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000001c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:16 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000fffffffb004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:16 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dcb30000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:16 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006006000", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4078e, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:16 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000001fffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ddda0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000c0ed00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 610.529851] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 610.537193] BTRFS error (device loop2): superblock checksum mismatch [ 610.545532] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 610.559345] BTRFS error (device loop2): open_ctree failed 22:54:16 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:16 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00060500", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 610.579618] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:16 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000066b6ac564f019dae0000", @ANYRES32=r2, @ANYBLOB="3e0900000a000200aaaaaaaaaaaa0000"], 0x28}, 0x1}, 0x0) 22:54:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40777, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:16 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000068000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000e087ffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a24ea0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:16 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) ioctl$sock_bt(r2, 0xdd17, &(0x7f0000000300)="c02df516e7f00871db03d79cf66d1b36636e0d907b015437432371127e53c90d7bf8e06771adbe175d7c0836143538b5760022d941acd6f30f0b9ba236a867c6e0e5231aa86885c122a2d984f2326324de6ae7cd30d0424918bbd40b8ac1b048ad12366ea333abc5ea2f1a6fca92c1cd97f3500c5563c6eedabbb64d7558800064c7ddfa46118ae8cccfa649c4b48335945fbdda27cdc2fa6c9fbb8b194157a28f411fa9d3129ca83d7fe465026af60c52e5c9c7d27425b79d6988b362eaf02ea9") ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="28002c851c00070f0000000000000000070000002d6f540e6ac34c3c94382e86119bfb80d174495eb4c5865b4eb7bf276a6cc09c8a322688a0aded3e74e6b9712f58fb659594865dadd018a499cf6c93d8765424d2e84062fdd3fada43c98c44", @ANYRES32=r3, @ANYBLOB="3e1300000a000200aaaaaaaaaaaa0000"], 0x28}, 0x1}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) [ 610.884731] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 610.900930] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 610.908303] BTRFS error (device loop2): superblock checksum mismatch 22:54:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 610.931957] EXT4-fs: 14 callbacks suppressed [ 610.931971] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 610.948253] BTRFS error (device loop2): open_ctree failed [ 610.962667] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:16 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adcba0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 610.981297] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:16 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006ffffff", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:17 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000080)={{{@in=@rand_addr, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', r2}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afdffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:17 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000007ffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000001000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 611.370625] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 611.377919] BTRFS error (device loop2): superblock checksum mismatch [ 611.386866] BTRFS error (device loop2): open_ctree failed 22:54:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40772, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:17 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ab6dc0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 611.507500] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 611.522486] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:17 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000340)="ab", 0x1, 0xfffffffffffffffb) keyctl$clear(0x7, r1) r2 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 611.550676] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 611.589875] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:17 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00070000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:17 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000ffffff970000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 611.729604] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 611.736835] BTRFS error (device loop2): superblock checksum mismatch [ 611.768158] BTRFS error (device loop2): open_ctree failed 22:54:17 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000020000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:17 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:17 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000100)={'bond_slave_0\x00', {0x2, 0x4e20}}) mq_open(&(0x7f0000000080)='(cgroupproc\x00', 0x880, 0xa, &(0x7f00000000c0)={0x2, 0x14114c59, 0x9, 0x80, 0x3, 0x1ff, 0x101, 0x2}) [ 611.863903] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 611.879683] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407af, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:17 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00066c00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 611.904249] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 611.927016] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a08000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:17 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000007fffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000005000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:18 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', r2}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="28002000f289b1", @ANYRES32=r3, @ANYBLOB="3e0900000a000200aaaaaaaaaaaa0000"], 0x28}, 0x1}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x10000, 0x0) [ 612.185805] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 612.193222] BTRFS error (device loop2): superblock checksum mismatch 22:54:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 612.234353] BTRFS error (device loop2): open_ctree failed [ 612.248342] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:18 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000dcb7000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 612.290737] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:18 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ea200000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:18 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006fdfdff", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:18 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x200000) r1 = getpgrp(0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x10000, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000300)={0x5000, &(0x7f0000000280), 0x8, r3, 0x2}) syslog(0xf, 0x0, 0x0) sched_getattr(r1, &(0x7f0000000380), 0x30, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x7, 0x0, &(0x7f0000000100)={r4, r5+10000000}, &(0x7f0000000140)) r6 = socket(0x9, 0x8080b, 0x3ff) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r7, @ANYBLOB="0200000000000000aaaaaaaaaaaa0000"], 0x28}, 0x1}, 0x0) 22:54:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407a5, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a7a000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 612.574626] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 612.581869] BTRFS error (device loop2): superblock checksum mismatch [ 612.594481] BTRFS error (device loop2): open_ctree failed 22:54:18 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000c94000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 612.667602] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:18 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000074000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afcfdffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 612.708967] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:18 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00600000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40797, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 612.971240] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 612.978554] BTRFS error (device loop2): superblock checksum mismatch [ 612.988818] BTRFS error (device loop2): open_ctree failed 22:54:18 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adcae0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:18 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffffe000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:19 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 613.277684] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 613.285316] BTRFS error (device loop2): superblock checksum mismatch [ 613.294105] BTRFS error (device loop2): open_ctree failed 22:54:19 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ad9dd0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:19 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363af4ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40795, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:19 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000040000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00230000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:19 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 613.784794] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 613.792191] BTRFS error (device loop2): superblock checksum mismatch [ 613.801331] BTRFS error (device loop2): open_ctree failed [ 613.813952] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 613.821418] BTRFS error (device loop2): superblock checksum mismatch [ 613.832015] BTRFS error (device loop2): open_ctree failed [ 613.850889] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 613.858256] BTRFS error (device loop2): superblock checksum mismatch 22:54:19 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a7e010000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:19 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000f4ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 613.894430] BTRFS error (device loop2): open_ctree failed [ 613.906811] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 613.914185] BTRFS error (device loop2): superblock checksum mismatch 22:54:19 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x401, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000280)=""/228) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-aes-aesni\x00'}, 0x58) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000140)=0xff, 0x4) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c0b070f00000000e6ff000007000000", @ANYRES32=r4, @ANYBLOB="3e0900000a000200aaaaaaaaaaaa0000"], 0x28}, 0x1}, 0x0) [ 613.961633] BTRFS error (device loop2): open_ctree failed 22:54:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adde00000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a1dea0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40799, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:19 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006007400", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 614.138643] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 614.146712] BTRFS error (device loop2): superblock checksum mismatch [ 614.155971] BTRFS error (device loop2): open_ctree failed [ 614.174491] print_req_error: I/O error, dev loop2, sector 128 22:54:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000000080)={@dev, @empty, @multicast2}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:20 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dcb40000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000068004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000006c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ae2dd0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:20 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00060700", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x2) [ 614.460632] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 614.467928] BTRFS error (device loop2): superblock checksum mismatch [ 614.483170] BTRFS error (device loop2): open_ctree failed [ 614.491679] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 614.499123] BTRFS error (device loop2): superblock checksum mismatch 22:54:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407b3, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:20 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000004000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 614.514947] BTRFS error (device loop2): open_ctree failed [ 614.543797] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 614.551264] BTRFS error (device loop2): superblock checksum mismatch [ 614.566194] BTRFS error (device loop2): open_ctree failed [ 614.574268] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 614.581624] BTRFS error (device loop2): superblock checksum mismatch 22:54:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000048004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 614.617624] BTRFS error (device loop2): open_ctree failed [ 614.626785] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 614.634089] BTRFS error (device loop2): superblock checksum mismatch [ 614.647813] BTRFS error (device loop2): open_ctree failed 22:54:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a21ea0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000050000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:20 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r1 = socket(0x10000000000009, 0x80000000001, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x3ff, 0x1, 0x0, 0x5, 0x7}, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:20 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 614.864613] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 614.872278] BTRFS error (device loop2): superblock checksum mismatch [ 614.883558] BTRFS error (device loop2): open_ctree failed [ 614.900523] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 614.907922] BTRFS error (device loop2): superblock checksum mismatch [ 614.917102] BTRFS error (device loop2): open_ctree failed 22:54:20 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffff8c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fffffdfd00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:20 executing program 6: r0 = socket(0x5, 0x80000000001, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x7, [0x3, 0x10000, 0x20, 0xc43, 0x7f, 0xe3, 0x3]}, 0x12) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6tnl0\x00', 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x93e}, [@NDA_LLADDR={0xc, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0xfffffda1}, 0x1}, 0xfffffffffffffffe) 22:54:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000009710000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4079e, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363addde0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(0xffffffffffffffff, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:20 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(0xffffffffffffffff, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 615.398811] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 615.406078] BTRFS error (device loop2): superblock checksum mismatch [ 615.413751] BTRFS error (device loop2): open_ctree failed 22:54:21 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = socket(0x1000000000001a, 0x80002, 0x90000000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x241, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}]}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f00000016c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0xfffffdc9}, 0x1}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r5, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000001240)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') umount2(&(0x7f0000000040)='./control/file1\x00', 0x0) creat(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r4) recvmsg$kcm(r1, &(0x7f0000001680)={&(0x7f0000000280)=@pptp={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000300)=""/148, 0x94}, {&(0x7f00000003c0)=""/187, 0xbb}, {&(0x7f0000000140)=""/24, 0x18}, {&(0x7f0000000480)=""/89, 0x59}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/2, 0x2}, {&(0x7f0000001500)=""/129, 0x81}], 0x7, &(0x7f0000001640)=""/17, 0x11, 0x46}, 0xc14ece35fdb44508) 22:54:21 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000fff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000971000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 615.440555] print_req_error: I/O error, dev loop2, sector 128 [ 615.468253] EXT4-fs error: 16 callbacks suppressed [ 615.468269] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363aea240000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 615.519831] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ae4ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:21 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40778, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(0xffffffffffffffff, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae5e13", 0x93}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 615.772379] QAT: Invalid ioctl [ 615.797750] QAT: Invalid ioctl [ 615.875345] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 615.882661] BTRFS error (device loop2): superblock checksum mismatch [ 615.908513] BTRFS error (device loop2): open_ctree failed [ 615.926731] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 615.934334] BTRFS error (device loop2): superblock checksum mismatch [ 615.953607] BTRFS error (device loop2): open_ctree failed 22:54:21 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000c95000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 615.982492] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 615.989833] BTRFS error (device loop2): superblock checksum mismatch 22:54:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440), 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 616.025017] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 616.062151] EXT4-fs: 14 callbacks suppressed [ 616.062167] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fdffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 616.065277] BTRFS error (device loop2): open_ctree failed [ 616.085096] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 616.092438] BTRFS error (device loop2): superblock checksum mismatch [ 616.107780] BTRFS error (device loop2): open_ctree failed 22:54:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a22ea0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 616.119421] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 616.136595] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:22 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006000010", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000fffffdfc0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407bd, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 616.307191] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 616.314509] BTRFS error (device loop2): superblock checksum mismatch [ 616.324860] BTRFS error (device loop2): open_ctree failed 22:54:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440), 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 616.581087] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 616.614372] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 616.647096] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 616.703931] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 616.721424] QAT: Invalid ioctl [ 616.743882] QAT: Invalid ioctl 22:54:22 executing program 6: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000000)=0x8000, 0x4) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_deladdr={0x5c, 0x15, 0x400, 0x70bd25, 0x9, {0xa, 0x9f, 0x30, 0xc8, r1}, [@IFA_FLAGS={0x8, 0x8, 0x100}, @IFA_CACHEINFO={0x14, 0x6, {0x7, 0x4, 0x2, 0xa9}}, @IFA_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, [], 0x20}}, @IFA_CACHEINFO={0x14, 0x6, {0x7fffffff, 0x7, 0x50d, 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x5061b112ea201a0c}, 0x0) 22:54:22 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006ffffff", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:22 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adcb70000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:22 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fffffe0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363af5ffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a7fffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440), 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407bb, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 616.991183] BTRFS error (device loop1): superblock checksum mismatch [ 617.003363] BTRFS error (device loop1): open_ctree failed [ 617.019154] BTRFS error (device loop1): superblock checksum mismatch [ 617.031910] BTRFS error (device loop1): open_ctree failed 22:54:22 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a001f0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 617.051018] BTRFS error (device loop1): superblock checksum mismatch [ 617.064245] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 617.085770] BTRFS error (device loop1): open_ctree failed 22:54:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 617.098840] BTRFS error (device loop1): superblock checksum mismatch [ 617.105133] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 617.139618] BTRFS error (device loop1): open_ctree failed 22:54:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ea1b000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:23 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00004800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:23 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006000700", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 617.164594] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 617.182420] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:23 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x1, 0x0) connect(r0, &(0x7f0000000440)=@ipx={0x4, 0x6, 0x81, "ca864bc00c87", 0x6}, 0x80) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r1, 0x1, 0x1, [0x9]}, 0xa) socket$netlink(0x10, 0x3, 0x3) r2 = socket(0x1000000000000a, 0x80000000001, 0x0) fsetxattr(r0, &(0x7f0000000380)=@random={'osx.', 'trustedeth0eth1trustedvmnet0+\a.ppp1{!{cgroup\x00'}, &(0x7f00000003c0)='bridge_slave_0\x00', 0xf, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x93e}, [@NDA_LLADDR={0xc, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x1a}, 0x1}, 0xfffffffffffffffd) sync_file_range(r2, 0xffffffff, 0x7ff, 0x6) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=""/211, 0xd3) 22:54:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40789, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 617.442786] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 617.450519] BTRFS error (device loop2): superblock checksum mismatch [ 617.461752] BTRFS error (device loop2): open_ctree failed [ 617.473092] BTRFS error (device loop1): superblock checksum mismatch 22:54:23 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adcaf0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 617.492522] BTRFS error (device loop1): open_ctree failed 22:54:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a04000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363addda0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:23 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) pwrite64(r1, &(0x7f0000000280)="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", 0x1000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2, 0x101}, 0x8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r0, 0x0, 0x392, 0x9, 0x7ff}) 22:54:23 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000200000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 617.570596] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 617.589469] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 617.614004] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 617.629663] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:23 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00068cffff", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40763, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:23 executing program 6: socket$netlink(0x10, 0x3, 0x1f) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=@bridge_getneigh={0x40, 0x1e, 0x0, 0x70bd28, 0x25dfdbfc, {0x7, 0x0, 0x0, r2, 0x8000, 0x2040}, [@IFLA_PROTO_DOWN={0x8, 0x27, 0xfffffffffffffffb}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x1}, @IFLA_EXT_MASK={0x8, 0x1d}, @IFLA_IF_NETNSID={0x8, 0x2e, 0x3}]}, 0x40}, 0x1}, 0x0) [ 617.853146] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 617.860432] BTRFS error (device loop2): superblock checksum mismatch [ 617.870789] BTRFS error (device loop2): open_ctree failed 22:54:23 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a1c000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:23 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000002000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3a", 0x4a}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363ae4dd0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a7fffffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:23 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="00060200", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 617.998219] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 618.016106] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:23 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'bcsh0\x00', 0x0}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40000, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in=@broadcast=0xffffffff, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e20, 0x0, 0x4e23, 0x0, 0xa, 0x20, 0xa0, 0x3e, r2, r4}, {0x800, 0x8, 0x0, 0x0, 0x5, 0x448a, 0x5ff8, 0x401}, {0x4, 0x100, 0xfffffffffffffffa, 0x2}, 0x9, 0x6e6bc0, 0x1, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x4d3, 0x33}, 0xa, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x3501, 0x3, 0x2, 0x0, 0x8, 0x7, 0x5}}, 0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x4, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffffffffffe0, 0x0, 0x0, 0x0, 0x3}, [@map={0x18, 0x5, 0x1, 0x0, r6}, @alu={0x4, 0x5, 0x2, 0xa, 0x6, 0xffffffffffffffff, 0x1}, @generic={0x7, 0x9, 0xa236, 0x2}], {0x95}}, &(0x7f0000000540)='GPL\x00', 0x7f, 0x0, 0x0, 0x41f00, 0x1, [], r3}, 0x48) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={"677265300200", r5}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f001cf3008d6affff07000000", @ANYRES32=r7, @ANYBLOB="3e0900000a000200aaaaaaaaaaaa0000"], 0x28}, 0x1}, 0x0) 22:54:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3a", 0x4a}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 618.226202] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 618.233527] BTRFS error (device loop2): superblock checksum mismatch [ 618.250475] BTRFS error (device loop2): open_ctree failed [ 618.263001] BTRFS error (device loop2): unsupported checksum algorithm 3786 22:54:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40791, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 618.270605] BTRFS error (device loop2): superblock checksum mismatch [ 618.286557] BTRFS error (device loop2): open_ctree failed [ 618.303364] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 618.310664] BTRFS error (device loop2): superblock checksum mismatch 22:54:24 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dcb20000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 618.342839] BTRFS error (device loop2): open_ctree failed [ 618.355375] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 618.362883] BTRFS error (device loop2): superblock checksum mismatch [ 618.380815] BTRFS error (device loop2): open_ctree failed 22:54:24 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000010000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fffffffd00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:24 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x500, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r4, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3a", 0x4a}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 618.675539] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 618.682954] BTRFS error (device loop2): superblock checksum mismatch [ 618.690465] BTRFS error (device loop2): open_ctree failed [ 618.699705] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 618.706964] BTRFS error (device loop2): superblock checksum mismatch [ 618.724346] BTRFS error (device loop2): open_ctree failed 22:54:24 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00230000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000001f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:24 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:24 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x41e0a2daee95c687, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000280)={0xdd, ""/221}) write$P9_RLINK(r1, &(0x7f00000001c0)={0x7, 0x47, 0x1}, 0x7) r2 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280066041c00070f0000000000000000070000001d835ea1e73283a684f1faa061ac928f333b2d05529fc5bdccf450f96f01e43ac0356ffb0f0333ded0364d3d010368d760f3b4730a60b4126f6116f9b59fc43db5994eaf1e211038a3da3e68c46fbe723b516ff47b5cd0b1331845e80045e24ecddc6b2fea3db51fb0425be5d097385f3b2f09721ef4ce12bef786b9dd35573979141172fbefea0fc134029ca8e9b0019e87c46785d91177e14460f6717482065c1138dd6e3d9a4487d780", @ANYRES32=r3, @ANYBLOB="3e0900000a000200aaaaaaaaaaaa0000"], 0x28}, 0x1}, 0x0) 22:54:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7", 0x6f}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000fffffff60000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4076e, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:24 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="8000", @ANYRES16=r1, @ANYBLOB="20002dbd700009d30000100000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(r2) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'bridge_slave_0\x00', 0x401}) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x3, 0x590, [0x0, 0x20000440, 0x20000470, 0x20000730], 0x0, &(0x7f0000000080), &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]}, 0x60f) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f0000000a00)={{0xfffffffffffffffe, 0x9}, 'port1\x00', 0x5, 0x0, 0x2, 0x6, 0x8c, 0x200, 0x1000, 0x0, 0x4, 0x3}) r4 = socket(0x1000000000000a, 0x80000000001, 0x0) socket$netlink(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r5, @ANYBLOB="3e0900000a568e764baaaaaaaaaa0000"], 0x28}, 0x1}, 0x0) [ 619.047779] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 619.055370] BTRFS error (device loop2): superblock checksum mismatch [ 619.063464] BTRFS error (device loop2): open_ctree failed [ 619.085375] BTRFS error (device loop2): unsupported checksum algorithm 3786 22:54:24 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a03000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 619.092649] BTRFS error (device loop2): superblock checksum mismatch [ 619.101717] BTRFS error (device loop2): open_ctree failed [ 619.127816] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 619.135197] BTRFS error (device loop2): superblock checksum mismatch 22:54:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7", 0x6f}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 619.167109] BTRFS error (device loop2): open_ctree failed [ 619.180424] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 619.187928] BTRFS error (device loop2): superblock checksum mismatch 22:54:25 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 619.216789] BTRFS error (device loop2): open_ctree failed 22:54:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000600000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000001f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 619.324907] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. 22:54:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407a3, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:25 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/28, 0x394) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000003c0)={0x0, 0x7f}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7", 0x6f}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 619.413759] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 619.421302] BTRFS error (device loop2): superblock checksum mismatch [ 619.431872] BTRFS error (device loop2): open_ctree failed [ 619.445993] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 619.453425] BTRFS error (device loop2): superblock checksum mismatch 22:54:25 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000000000007a004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 619.474176] BTRFS error (device loop2): open_ctree failed 22:54:25 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:25 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a23000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000007a0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:25 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="3e09ff01000000aaaaaaaaf6ff"], 0x28}, 0x1}, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=[&(0x7f00000000c0)='bridge_slave_0\x00', &(0x7f0000000100)='bridge_slave_0\x00'], &(0x7f0000000280)=[&(0x7f00000001c0)=':]]\x00']) fanotify_init(0x7, 0x80801) lremovexattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300)=@random={'osx.', 'bridge_slave_0\x00'}) 22:54:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffffffffffff40000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee", 0x81}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363aea170000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x4078a, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 619.839449] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 619.846845] BTRFS error (device loop2): superblock checksum mismatch [ 619.873462] BTRFS error (device loop2): open_ctree failed 22:54:25 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006c0ed00", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 619.886717] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 619.893994] BTRFS error (device loop2): superblock checksum mismatch [ 619.924375] BTRFS error (device loop2): open_ctree failed 22:54:25 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000001fffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:25 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000002000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:25 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="3e09f6000ae00100aaaaaaaaaaaa0000"], 0x28}, 0x1}, 0x0) [ 619.938353] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. [ 619.962470] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. 22:54:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee", 0x81}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000030000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ea24000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee", 0x81}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 620.326306] netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. [ 620.342005] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 620.349290] BTRFS error (device loop2): superblock checksum mismatch 22:54:26 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10000000000008, 0x4080000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x4, 0x90000) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f00000000c0)={0x6, 0x0, [{0x834, 0x0, 0x7260}, {0x0, 0x0, 0x8000}, {0xc00108e7, 0x0, 0x6}, {0xb62, 0x0, 0x401}, {0x0, 0x0, 0xb7e}, {0xb33, 0x0, 0xffffffffffffff55}]}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:26 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006ffffff", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) [ 620.381567] BTRFS error (device loop2): open_ctree failed [ 620.400300] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 620.407545] BTRFS error (device loop2): superblock checksum mismatch 22:54:26 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000fffffff600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 620.429110] BTRFS error (device loop2): open_ctree failed 22:54:26 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363afffffffb000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407a8, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000004c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:26 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f00000000c0)={0x7fffffff, 0x2, 0x7, 'queue0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000fff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e0", 0x8a}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 620.722876] EXT4-fs error: 14 callbacks suppressed [ 620.722893] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 620.765944] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 620.774268] BTRFS error (device loop2): superblock checksum mismatch [ 620.790501] BTRFS error (device loop2): open_ctree failed [ 620.793679] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing 22:54:26 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363affffffffffffff7f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 620.841506] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 620.848898] BTRFS error (device loop2): superblock checksum mismatch 22:54:26 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006003ff8", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:26 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000fff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 620.895401] BTRFS error (device loop2): open_ctree failed [ 620.907831] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 620.915106] BTRFS error (device loop2): superblock checksum mismatch 22:54:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407aa, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) [ 620.963661] BTRFS error (device loop2): open_ctree failed 22:54:26 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000006c0)={0x0, 0xffffffff, 0x400, 0x20}, &(0x7f0000000700)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000780)={r3, 0x2c, &(0x7f0000000740)=[@in={0x2, 0x4e24, @broadcast=0xffffffff}, @in6={0xa, 0x4e21, 0x5c0a, @mcast1={0xff, 0x1, [], 0x1}, 0x2}]}, &(0x7f00000007c0)=0x10) r4 = dup(r0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000140)={0xfffffffffffffffe, 0x100000000005}, 0x161) accept4$inet6(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f00000000c0)=0x1c, 0x800) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000100)=0x39, 0x4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000280)={0x1, {{0x2, 0x4e23, @multicast2=0xe0000002}}, 0x0, 0x7, [{{0x2, 0x4e22, @multicast1=0xe0000001}}, {{0x2, 0x4e24, @multicast1=0xe0000001}}, {{0x2, 0x4e21, @rand_addr=0x10000}}, {{0x2, 0x4e21, @multicast2=0xe0000002}}, {{0x2, 0x4e24, @rand_addr=0x2}}, {{0x2, 0x4e23, @rand_addr=0xfffffffffffffff8}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}}]}, 0x410) 22:54:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000ffffffe40000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e0", 0x8a}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a1cea0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 621.206486] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 621.213925] BTRFS error (device loop2): superblock checksum mismatch [ 621.223399] BTRFS error (device loop2): open_ctree failed 22:54:27 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000dcb60000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 621.270325] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 621.288903] EXT4-fs: 14 callbacks suppressed [ 621.288917] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:27 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 621.335790] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 621.362940] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:27 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:27 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e0", 0x8a}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363af4000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407a4, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a6c000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 621.593468] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 621.600808] BTRFS error (device loop2): superblock checksum mismatch [ 621.620331] BTRFS error (device loop2): open_ctree failed 22:54:27 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x204340) socket$netlink(0x10, 0x3, 0x6) getsockname$unix(r1, &(0x7f0000000100), &(0x7f00000001c0)=0x6e) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000300)=0x8e, 0x4) r2 = socket(0x1000000000000a, 0x80000000001, 0x0) accept$nfc_llcp(r2, 0x0, &(0x7f00000002c0)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) r4 = semget$private(0x0, 0x8000000000000007, 0x20) semctl$SEM_STAT(r4, 0x1, 0x12, &(0x7f0000000080)=""/3) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) 22:54:27 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000000000000fff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c9", 0x8f}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:27 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000fffffff5000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 621.815174] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 621.840243] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a05000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 621.882486] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 621.906691] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:27 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006006800", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000740000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:27 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r4 = shmget(0x3, 0x4000, 0x400, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_RMID(r4, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f00000000c0)={'bcsh0\x00', @ifru_names='veth0_to_bridge\x00'}) ioctl$TIOCCBRK(r3, 0x5428) 22:54:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x41, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c9", 0x8f}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 622.076061] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 622.083333] BTRFS error (device loop2): superblock checksum mismatch [ 622.090486] BTRFS error (device loop2): open_ctree failed 22:54:27 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a7fffffffffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:28 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000400000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a003f0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:28 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x74, &(0x7f0000000080)=[@in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e22, 0x8, @empty, 0x4}, @in6={0xa, 0x4e21, 0x7fff, @remote={0xfe, 0x80, [], 0xbb}, 0x9}, @in6={0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, @in={0x2, 0x4e20, @multicast2=0xe0000002}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r3, 0xff, 0xa61c, 0x4, 0x8, 0x8000}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 622.295519] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 622.312847] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 622.354950] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 622.378317] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000100000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c9", 0x8f}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:28 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="0006097100", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x40771, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:28 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000023000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 622.455755] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 622.462996] BTRFS error (device loop2): superblock checksum mismatch [ 622.472820] BTRFS error (device loop2): open_ctree failed 22:54:28 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000071090000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:28 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000080)) r3 = dup(r0) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000001c0), 0x4) 22:54:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363adbdd0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae", 0x91}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000ea23000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 622.749816] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 622.775149] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 622.785907] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 622.793178] BTRFS error (device loop2): superblock checksum mismatch [ 622.811330] BTRFS error (device loop2): open_ctree failed [ 622.831999] EXT4-fs error (device sda1): ext4_has_uninit_itable:3149: comm syz-executor5: Inode table for bg 0 marked as needing zeroing [ 622.854106] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, 22:54:28 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000ffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x407a7, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 22:54:28 executing program 6: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x93e}, [@NDA_LLADDR={0xc, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x16}, 0x1}, 0x0) 22:54:28 executing program 5: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7045, &(0x7f0000000000)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)="000600", &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x30, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}, 0x2c}]}) 22:54:28 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000074000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae", 0x91}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 22:54:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000016c0)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a0000006c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd38", 0xbe, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a000000000000ea210000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:29 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = memfd_create(&(0x7f0000000080)='*\x00', 0x1) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f00000000c0)=0xf9, 0x4) r2 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x93e}, [@NDA_LLADDR={0xa, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x28}, 0x1}, 0x0) [ 623.200202] BTRFS error (device loop2): unsupported checksum algorithm 3786 [ 623.207504] BTRFS error (device loop2): superblock checksum mismatch [ 623.215174] BTRFS error (device loop2): open_ctree failed 22:54:29 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000060000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000180)=ANY=[]) 22:54:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x6, 0x0) writev(r1, &(0x7f0000003440)=[{&(0x7f0000000140)="681604810bf9fcffe352b28ef7e9f7d4363ee17901a6850e4ae33c2194e48d61da7263f1c233feafbc9f424f80f34c3e59763a766f63f65a8c5ef063370f487fbe302b7a68ad55c34c3afd8e5c0dfee3c3fe720232ffb27b75d8795446b648feb6903c1eeacdd8fd4c4002f2911dc7fb4e408ccdaeba7b87024901d7e6a2aac4ee3611ec9188215005e06f4cdb31c958ae", 0x91}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xe80}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) [ 623.300469] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000001000000, [ 623.318170] WARNING: CPU: 0 PID: 14285 at fs/btrfs/volumes.c:1071 close_fs_devices+0xbf0/0xfd0 [ 623.326989] Kernel panic - not syncing: panic_on_warn set ... [ 623.326989] [ 623.334381] CPU: 0 PID: 14285 Comm: syz-executor7 Not tainted 4.18.0-rc4+ #145 [ 623.341757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.351122] Call Trace: [ 623.353769] dump_stack+0x1c9/0x2b4 [ 623.357430] ? dump_stack_print_info.cold.2+0x52/0x52 [ 623.362667] panic+0x238/0x4e7 [ 623.365885] ? add_taint.cold.5+0x16/0x16 [ 623.370089] ? __warn.cold.8+0x148/0x1ba [ 623.374186] ? close_fs_devices+0xbf0/0xfd0 [ 623.378539] __warn.cold.8+0x163/0x1ba [ 623.382464] ? close_fs_devices+0xbf0/0xfd0 [ 623.386820] report_bug+0x252/0x2d0 [ 623.390482] do_error_trap+0x1fc/0x4d0 [ 623.394412] ? trace_hardirqs_on+0xd/0x10 [ 623.398591] ? math_error+0x3e0/0x3e0 [ 623.402422] ? note_gp_changes+0x550/0x550 [ 623.406681] ? __blkdev_put+0x3f1/0x830 [ 623.410698] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 623.415571] do_invalid_op+0x1b/0x20 [ 623.419323] invalid_op+0x14/0x20 [ 623.422812] RIP: 0010:close_fs_devices+0xbf0/0xfd0 [ 623.427746] Code: 4b af fe 0f 0b e8 20 4b af fe 0f 0b 48 89 f7 e8 f6 24 ed fe e9 de f5 ff ff e8 0c 4b af fe 0f 0b e9 fd fd ff ff e8 00 4b af fe <0f> 0b e9 a8 fd ff ff 48 8b bd 58 fd ff ff e8 8d 25 ed fe e9 35 fd [ 623.447442] RSP: 0018:ffff88018e98f050 EFLAGS: 00010216 [ 623.452831] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc9000322e000 [ 623.460119] RDX: 000000000001ab8e RSI: ffffffff82ccc0a0 RDI: 0000000000000007 [ 623.467403] RBP: ffff88018e98f350 R08: ffff880199dfa140 R09: 0000000000000006 [ 623.474686] R10: ffff880199dfa140 R11: 0000000000000000 R12: ffffed0031d31e2d [ 623.481992] R13: 1ffff10031d31e1d R14: ffff88018e98f0e8 R15: ffff8801cfd6a048 [ 623.489313] ? close_fs_devices+0xbf0/0xfd0 [ 623.493692] ? btrfs_alloc_device+0x8e0/0x8e0 [ 623.498224] ? do_raw_spin_unlock+0xa7/0x2f0 [ 623.502673] ? kasan_check_write+0x14/0x20 [ 623.506928] ? wake_up_q+0xb3/0x100 [ 623.510585] ? __mutex_unlock_slowpath+0x439/0x8c0 [ 623.515559] ? wait_for_completion+0x8d0/0x8d0 [ 623.520221] btrfs_close_devices+0x29/0x150 [ 623.524654] btrfs_mount_root+0x143c/0x1e90 [ 623.529020] ? btrfs_decode_error+0x70/0x70 [ 623.533389] ? save_stack+0x43/0xd0 [ 623.537035] ? __kasan_slab_free+0x11a/0x170 [ 623.541481] ? kasan_slab_free+0xe/0x10 [ 623.545475] ? kfree+0xd9/0x260 [ 623.548774] ? mount_fs+0xae/0x328 [ 623.552330] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 623.557108] ? do_mount+0x581/0x30e0 [ 623.560840] ? ksys_mount+0x12d/0x140 [ 623.564659] ? __x64_sys_mount+0xbe/0x150 [ 623.568829] ? do_syscall_64+0x1b9/0x820 [ 623.572913] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.578305] ? kasan_check_read+0x11/0x20 [ 623.582494] ? do_raw_spin_unlock+0xa7/0x2f0 [ 623.586967] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 623.591584] ? do_raw_spin_lock+0xc1/0x200 [ 623.595839] ? retint_kernel+0x10/0x10 [ 623.599771] mount_fs+0xae/0x328 [ 623.603158] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 623.608029] vfs_kern_mount.part.34+0xdc/0x4e0 [ 623.612652] ? may_umount+0xb0/0xb0 [ 623.616341] vfs_kern_mount+0x40/0x60 [ 623.620172] btrfs_mount+0x4a9/0x215e [ 623.624005] ? kasan_check_read+0x11/0x20 [ 623.628190] ? rcu_is_watching+0x8c/0x150 [ 623.632376] ? btrfs_remount+0x1710/0x1710 [ 623.636633] ? __lockdep_init_map+0x105/0x590 [ 623.641165] ? __lockdep_init_map+0x105/0x590 [ 623.645689] ? lockdep_init_map+0x9/0x10 [ 623.649768] ? __init_waitqueue_head+0x9e/0x150 [ 623.654453] ? init_wait_entry+0x1c0/0x1c0 [ 623.658706] ? memcpy+0x45/0x50 [ 623.662024] ? alloc_vfsmnt+0x779/0x9f0 [ 623.666074] ? mnt_free_id.isra.27+0x60/0x60 [ 623.670546] ? graph_lock+0x170/0x170 [ 623.674372] ? rcu_pm_notify+0xc0/0xc0 [ 623.678324] ? find_held_lock+0x36/0x1c0 [ 623.682430] ? lock_downgrade+0x8f0/0x8f0 [ 623.686632] mount_fs+0xae/0x328 [ 623.690016] ? btrfs_remount+0x1710/0x1710 [ 623.694263] ? mount_fs+0xae/0x328 [ 623.697817] ? mpi_free.cold.1+0x19/0x19 [ 623.701905] vfs_kern_mount.part.34+0xdc/0x4e0 [ 623.706516] ? may_umount+0xb0/0xb0 [ 623.710163] ? _raw_read_unlock+0x22/0x30 [ 623.714352] ? __get_fs_type+0x97/0xc0 [ 623.718275] do_mount+0x581/0x30e0 [ 623.721846] ? copy_mount_string+0x40/0x40 [ 623.726106] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 623.730985] ? retint_kernel+0x10/0x10 [ 623.734933] ? copy_mount_options+0x1e3/0x380 [ 623.739451] ? copy_mount_options+0x1e3/0x380 [ 623.744088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 623.749670] ? copy_mount_options+0x285/0x380 [ 623.754237] ksys_mount+0x12d/0x140 [ 623.757912] __x64_sys_mount+0xbe/0x150 [ 623.761904] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 623.766949] do_syscall_64+0x1b9/0x820 [ 623.770864] ? finish_task_switch+0x1d3/0x870 [ 623.775392] ? syscall_return_slowpath+0x5e0/0x5e0 [ 623.780350] ? syscall_return_slowpath+0x31d/0x5e0 [ 623.785308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 623.790863] ? retint_user+0x18/0x18 [ 623.794609] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 623.799485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.804833] RIP: 0033:0x4584ea [ 623.808030] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 623.827713] RSP: 002b:00007f2aa458aa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 623.835473] RAX: ffffffffffffffda RBX: 00007f2aa458ab30 RCX: 00000000004584ea [ 623.842789] RDX: 00007f2aa458aad0 RSI: 00000000200000c0 RDI: 00007f2aa458aaf0 [ 623.850179] RBP: 00000000200000c0 R08: 00007f2aa458ab30 R09: 00007f2aa458aad0 [ 623.857464] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 623.864750] R13: 0000000000000000 R14: 00000000004d3c48 R15: 0000000000000000 [ 623.873115] Dumping ftrace buffer: [ 623.877180] (ftrace buffer empty) [ 623.880893] Kernel Offset: disabled [ 623.884529] Rebooting in 86400 seconds..